Check out my first novel, midnight's simulacra!
Hackery: Difference between revisions
From dankwiki
Line 35: | Line 35: | ||
===Zetetic=== | ===Zetetic=== | ||
* Network traffic analysis (ala Wireshark or tcpdump) with strong covert channel detection | * Network traffic analysis (ala Wireshark or tcpdump) with strong [[covert channel]] detection | ||
* Passive network modeling (protocols, services, hosts, versions) initially | * Passive network modeling (protocols, services, hosts, versions) initially | ||
** To be paired with vulnerability correlation, active probing, histories (ala SourceFire RNA?) | ** To be paired with vulnerability correlation, active probing, histories (ala SourceFire RNA?) |