List of Figures

   


Figure 2.1 You are in a maze of twisty little passages.

Figure 2.2 Attack paths to root.

Figure 2.3 Intracompany firewalls.

Figure 3.1 SSH-wrapped X session.

Figure 5.1 Multiple subnet firewall/router.

Figure 5.2 Multiple firewalls and router.

Figure 5.3 Distributed Denial of Service attack.

Figure 5.4(a) Man-in-the-middle attack.

Figure 5.4(b) Man-in-the-middle attack (cont.).

Figure 6.1 One-Way Credit Card Data Path.

Figure 6.2 Buffer overflow stack.

Figure 12.1 Virus path through the VPN.

Figure 12.2 Masquerading packets.

Figure 12.3 Traversing the firewall using IP Tables.

Figure 12.4 Masquerading packets.

Figure 12.5 Traversing the firewall using IP Chains.


       
    Top


    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    Real World Linux Security Prentice Hall Ptr Open Source Technology Series
    ISBN: N/A
    EAN: N/A
    Year: 2002
    Pages: 260

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net