For your continued reading, you may wish to visit these resources for more information on information-gathering techniques and software.
Packet Storm : Packet Sniffers, a collection of specialized packet sniffers, http://packetstormsecurity.nl/sniffers/
"Security of the WEP Algorithm," by Nikita Borisov, Ian Goldberg, and David Wagner, http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
"How to Watch Spyware Watching You," Steven Gibson, http://grc.com/oo/packetsniff.htm
"Sniffing Out Packet Sniffers," by Brien Posey, http://networking.earthweb.com/netsecur/article/0,,12084_766671_2,00.html
EtherPeek, an ethernet packet analysis tool by WildPackets, http://www.wildpackets.com/products/etherpeek_mac
NetMinder, Ethernet protocol analysis and alerting by Neon Software, http://www.neon.com/NetMinder_Ethernet.html
"Sniffers: What They Are and How to Protect Yourself," by Matthew Tanase, http://online.securityfocus.com/infocus/1549
"TCP/IP for the Uninitiated," by Erik Iverson, http://www.dragonmount.net/tutorials/
"Introduction to TCP/IP," http://www.yale.edu/pclt/COMM/TCPIP.HTM
Example Web Packet Sniffer (written in Perl), http://stein.cshl.org/~lstein/talks/WWW6/sniffer/
"Remote OS Detection via TCP/IP Stack FingerPrinting," by Fyodor, http://www. insecure .org/nmap/nmap-fingerprinting-article.html
"Port Scanning Methods," by AuditMyPc.com, http://www.auditmypc.com/freescan/readingroom/port_scanning.asp
Top |