What is one technique that can reduce attack vectors from IP, TCP, and
UDP?
Collect a set of network devices, such as home firewalls, network-enabled
phones, PDAs, palmtops, and music players. Use nmap to scan for open
network services, and ethereal (or similar analysis tool) to evaluate TCP
packets. Do the devices have unique TCP profiles? How do the devices respond to invalid TCP checksums or LAND attacks?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here