SYN packet manipulation
-- SYN packet manipulation
http://www.iss.net/security_center/advi
-- Syn Flood experiment
http://www.niksula.cs.hut.fi/~dforsber/
-- SYN Cookie
http://cr.yp.to/syncookies.html
Smurf DOS
-- ISS.com: Description
http://www.iss.net/security_center/advi
-- GRC.com: DDOS Anatomy
http://grc.com/dos/grcdos.htm
IRC (Internet Relay Chat) Client attacks
-- IIS.com: Description
http://www.iss.net/security_center/advi
Service attacks
-- Buffer Overflow attacks
http://www.iss.net/security_center/advi
-- Buffer overflow vulnerabilities explained
http://www.hacker.pl/gminick/pliki/notm
-- Wireless Attacks Threaten Wired Networks
http://www.infosecuritymag.com/2001/oct
I hope these links will draw out some important info abt types of attacks used by blackhats and may be able to answer atleast 1% of your queries .
1 comments:
I saw your blog it's good. add more topics relating to security.
Thanks
bcdalai
See my blog:
http://bcdalai.blogspot.com/
http://bcdalai.blogspot.com/
Post a Comment