Layer 2 Attacks

    VLAN Hopping

    ARP Cache Poisoning

    Switch Architecture Weaknesses

Layer 3 Attacks

    IP Redirections

    Session Hijacking

    Session Replay

Network / OS Layer Attacks

    Network Hash Passing

    DHCP and DNS Weaknesses

    Various OS Weaknesses

Advanced Attacks

    Protocol Fuzzing

    Cryptographic Weaknesses

    Buffer Overflow

    Zero-day

results matching ""

    No results matching ""