Retrieve information, modify network behavior
Network attacks
Article REF: H5830 V1
Retrieve information, modify network behavior
Network attacks

Author : Laurent LEVIER

Publication date: April 10, 2005 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

2. Retrieve information, modify network behavior

The intruder has now established a precise list of the various operating systems present on a network, using the techniques presented in paragraph 1 . The intruder is now keen to determine which systems to focus on.

Unfortunately for him, many systems are protected by security mechanisms, and he needs to get an idea of how important a system is without succeeding in an intrusion. on each of them, as this would take too long...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Retrieve information, modify network behavior

Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details