diff --git a/anno2/mie/Reti/seminario/Protocol_Security.pdf b/anno2/mie/Reti/seminario/Protocol_Security.pdf new file mode 100644 index 0000000..26230b9 Binary files /dev/null and b/anno2/mie/Reti/seminario/Protocol_Security.pdf differ diff --git a/anno2/mie/Reti/seminario/seminario.md b/anno2/mie/Reti/seminario/seminario.md new file mode 100644 index 0000000..90d6d49 --- /dev/null +++ b/anno2/mie/Reti/seminario/seminario.md @@ -0,0 +1,40 @@ +- dos + - fragmentation attack + - ping of death + - evasion of firewalls and dos using fragmentation + - icmp + - icmp echo attack: smurf + - icmp redirect attack + - icmp destination unreachable attack + - udp smurf + - tcp + - ack storm + - syn flooding + - syn cookies + - state attack +- access to information + - udp port scan + - tcp + - tcp scan + - tcp SYN scan + - tcp FIN scan + - connect() scan + - idle scan + - os fingerprinting +- sniffing + - in switched environments: mac flooding, mac cloning + - sniffing detection + - sniffing on wireless networks +- spoofing / impersonation of a host + - arp spoofing and defense + - arp spoofing and defense with wireless networks + - ip spoofing + - blind ip spoofing + - mitm + - udp spoofing + - tcp spoofing: + - probabilistic attacks +- hijacking + - tcp hijacking + +