Building.Open.Source.Network.Security.Tools.Components.And.Techniques [Electronic resources] نسخه متنی
لطفا منتظر باشید ...
Chapter 9
IANA, "Protocol Number and Assignment Services," Via the Internet, http://www.iana.org/assignments/port-numbers.
St. Johns, M. "Identification Protocol," via the Internet, http://www.ietf.org/rfc/rfcl413.txt.
Hobbit. "The FTP bounce attack," via the Internet, http://www.insecure.org/nmap/hobbit.ftpbounce.txt.
Jacobson, V. "Traceroute Network Mapping Tool," via the Internet, http://www.carpe.net/src/.
Schiffman, M. and Goldsmith, D. "A Traceroute-Like Analysis of IP Packet Responses to Determine Gateway Access Control Lists," via the Internet, http://www.packetfactory.net/firewalk/firewalk-finall.
Braden, R. "Requirements for Internet Hosts-Communication Layers," via the Internet, http://www.ietf.org/rfc/rfcll22.txt.