Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Networking Concepts & Commands/Applications"
From NetSec
WillieArce (Talk | contribs) m |
|||
Line 3: | Line 3: | ||
*[[MITM attack]] - (Man in the Middle attack) A way to get between two hosts so that traffic can be sniffed between them | *[[MITM attack]] - (Man in the Middle attack) A way to get between two hosts so that traffic can be sniffed between them | ||
*[[Packet]]s - Small snippets of data that establish or carry data for connections or stateless [[protocols]] | *[[Packet]]s - Small snippets of data that establish or carry data for connections or stateless [[protocols]] | ||
− | *[ | + | *[http://www.blackhatlibrary.net/TCP-RST_Injection Packet Injection] - Forging packets |
*[[Firewall]] - | *[[Firewall]] - | ||
*[[IDS]] - | *[[IDS]] - |
Latest revision as of 18:25, 25 August 2012
Terms
- Sniffing - Intercepting and reading traffic
- MITM attack - (Man in the Middle attack) A way to get between two hosts so that traffic can be sniffed between them
- Packets - Small snippets of data that establish or carry data for connections or stateless protocols
- Packet Injection - Forging packets
- Firewall -
- IDS -
- IPS -
Tools
- nemesis
- cain & abel
- OSSEC-HIDS
- Snort
- NuFW
- iptables
- OSSIM
- Prelude
- OpenSIMS
- Quagga
- Zebra