A Six Sigma project to attack an ongoing process problem ...
The Attack Process
-
Upload
sreekanth-pagadapalli -
Category
Documents
-
view
214 -
download
0
Transcript of The Attack Process
-
8/12/2019 The Attack Process
1/55
http://www.cert.org/research/JHThesis/Start.html -
8/12/2019 The Attack Process
2/55
-
8/12/2019 The Attack Process
3/55
http://my.safaribooksonline.com/158705115X/app01gloss01#app01gloss01entry66 -
8/12/2019 The Attack Process
4/55
http://www.jargon.org/ -
8/12/2019 The Attack Process
5/55
http://www.cert.org/research/JHThesis/Start.htmlhttp://my.safaribooksonline.com/158705115X/ch03lev1sec1#ch03fig02 -
8/12/2019 The Attack Process
6/55
http://www.cert.org/research/JHThesis/Start.htmlhttp://my.safaribooksonline.com/158705115X/ch03lev1sec1#ch03fig02 -
8/12/2019 The Attack Process
7/55
http://my.safaribooksonline.com/http://support.safaribooksonline.com/viewCat?cat=Account_Management&prod=safarihttp://support.safaribooksonline.com/faqs?prod=safarihttp://support.safaribooksonline.com/top?prod=safarihttp://support.safaribooksonline.com/alerts?prod=safarihttp://support.safaribooksonline.com/home?prod=safarihttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ROUGHCUTShttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/SHORTCUTShttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/BOOKTITLEhttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1#X2ludGVybmFsX0h0bWxWaWV3P3htbGlkPTE1ODcwNTExNXglMkZjaDAzbGV2MXNlYzUmcXVlcnk9http://appworld.blackberry.com/webstore/content/132080/https://play.google.com/store/apps/details?id=com.safaribooksonlinehttp://itunes.apple.com/us/app/safari-to-go/id385824712?mt=8http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1#lefttabtoc -
8/12/2019 The Attack Process
8/55
http://my.safaribooksonline.com/book/networking/security/158705115xhttp://my.safaribooksonline.com/158705115x/pref07http://my.safaribooksonline.com/158705115x/pref06http://my.safaribooksonline.com/158705115x/pref05http://my.safaribooksonline.com/158705115x/pref04http://my.safaribooksonline.com/158705115x/pref03http://my.safaribooksonline.com/158705115x/pref02http://my.safaribooksonline.com/158705115x/pref01http://my.safaribooksonline.com/158705115x/copyrightp1ghttp://my.safaribooksonline.com/book/networking/security/158705115x/index/indexhttp://my.safaribooksonline.com/book/networking/security/158705115xhttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1?bookview=contentshttp://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1?bookview=searchhttp://my.safaribooksonline.com/book/networking/security/158705115xhttp://my.safaribooksonline.com/book/networking/security/158705115xhttps://ssl.safaribooksonline.com/trial?portal=my&iid=headerBanner-reader-linkhttp://my.safaribooksonline.com/subscribehttp://my.safaribooksonline.com/login?iid=reactivate-link&targetpage=/reactivationhttp://my.safaribooksonline.com/login?targetpage=/158705115x/ch03lev1sec1http://support.safaribooksonline.com/viewCat?cat=FAQ_Offline_Reading&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Mobile&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Content_Reader&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Content&prod=safarihttp://support.safaribooksonline.com/viewCat?cat=Billing&prod=safari -
8/12/2019 The Attack Process
9/55
http://my.safaribooksonline.com/158705115x/ch03lev1sec5http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/158705115x/ch03lev1sec5http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/158705115X/ch03lev1sec6http://my.safaribooksonline.com/158705115X/ch03lev1sec4http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/book/networking/security/158705115x/secure-networking-threats/ch03lev1sec1http://my.safaribooksonline.com/158705115x/ch03lev1sec5?readerfullscreen=&readerleftmenu=1&reader=http://my.safaribooksonline.com/158705115x/indexhttp://my.safaribooksonline.com/158705115x/part04http://my.safaribooksonline.com/158705115x/part03http://my.safaribooksonline.com/158705115x/part02http://my.safaribooksonline.com/158705115x/ch04http://my.safaribooksonline.com/158705115x/ch03lev1sec8http://my.safaribooksonline.com/158705115x/ch03lev1sec7http://my.safaribooksonline.com/158705115x/ch03lev1sec6http://my.safaribooksonline.com/158705115x/ch03lev1sec5http://my.safaribooksonline.com/158705115x/ch03lev1sec4http://my.safaribooksonline.com/158705115x/ch03lev1sec3http://my.safaribooksonline.com/158705115x/ch03lev1sec2http://my.safaribooksonline.com/158705115x/ch03lev1sec1http://my.safaribooksonline.com/158705115x/ch03http://my.safaribooksonline.com/158705115x/ch02http://my.safaribooksonline.com/158705115x/ch01http://my.safaribooksonline.com/158705115x/part01 -
8/12/2019 The Attack Process
10/55
http://my.safaribooksonline.com/158705115X/ch03lev1sec6http://my.safaribooksonline.com/158705115X/ch03lev1sec4 -
8/12/2019 The Attack Process
11/55
-
8/12/2019 The Attack Process
12/55
-
8/12/2019 The Attack Process
13/55
http://www.nessus.org/http://www.insecure.org/nmap -
8/12/2019 The Attack Process
14/55
http://my.safaribooksonline.com/158705115X/part03#part03http://my.safaribooksonline.com/158705115X/ch04#ch04http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch04#ch04http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch04#ch04 -
8/12/2019 The Attack Process
15/55
http://www.google.com/ -
8/12/2019 The Attack Process
16/55
http://www.nessus.org/http://www.insecure.org/nmap -
8/12/2019 The Attack Process
17/55
http://expandcodesegments%28%29/ -
8/12/2019 The Attack Process
18/55
http://www.insecure.org/nmap/nmap-fingerprinting-article.htmlhttp://expandcodesegments%28%29/ -
8/12/2019 The Attack Process
19/55
http://winfingerprint.sourceforge.net/aptools.phphttp://www.netstumbler.com/ -
8/12/2019 The Attack Process
20/55
http://www.ethereal.com/http://www.wardriving.com/ -
8/12/2019 The Attack Process
21/55
http://my.safaribooksonline.com/getfile?item=cjVnNWkxMGhwL2ExcmRlY3g1YS9wMWlnczdtLzh0Zi9fY3MwLmx0MGk1YWdpZ2Yz -
8/12/2019 The Attack Process
22/55
-
8/12/2019 The Attack Process
23/55
http://my.safaribooksonline.com/158705115X/ch06#ch06http://www.doxpara.com/read.php/code/paketto.htmlhttp://www.insecure.org/stf/secnet_ids/secnet_ids.htmlhttp://monkey.org/~dugsong/fragroute/ -
8/12/2019 The Attack Process
24/55
http://www.shmoo.com/phrack/Phrack49/p49-14http://www.cert.org/ -
8/12/2019 The Attack Process
25/55
http://www.cgisecurity.com/articles/xss-faq.shtml -
8/12/2019 The Attack Process
26/55
http://my.safaribooksonline.com/158705115X/ch09#ch09http://www.w3.org/Security/Faq/wwwsf4.html -
8/12/2019 The Attack Process
27/55
-
8/12/2019 The Attack Process
28/55
http://www.hping.org/http://www.packetfactory.net/libnet/ -
8/12/2019 The Attack Process
29/55
-
8/12/2019 The Attack Process
30/55
-
8/12/2019 The Attack Process
31/55
-
8/12/2019 The Attack Process
32/55
-
8/12/2019 The Attack Process
33/55
-
8/12/2019 The Attack Process
34/55
http://www.openwall.com/john/http://www.atstake.com/ -
8/12/2019 The Attack Process
35/55
http://www.zetetic.net/products.htmlhttp://my.safaribooksonline.com/158705115X/ch04#ch04 -
8/12/2019 The Attack Process
36/55
http://my.safaribooksonline.com/158705115X/ch05#ch05http://www.dcphonehome.com/http://my.safaribooksonline.com/158705115X/ch01#ch01 -
8/12/2019 The Attack Process
37/55
http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec2#ch06lev2sec9 -
8/12/2019 The Attack Process
38/55
-
8/12/2019 The Attack Process
39/55
-
8/12/2019 The Attack Process
40/55
http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec7#ch06lev1sec7 -
8/12/2019 The Attack Process
41/55
-
8/12/2019 The Attack Process
42/55
-
8/12/2019 The Attack Process
43/55
http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec7#ch06lev1sec7 -
8/12/2019 The Attack Process
44/55
-
8/12/2019 The Attack Process
45/55
http://www.slashdot.org/ -
8/12/2019 The Attack Process
46/55
http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec2#ch06lev2sec11 -
8/12/2019 The Attack Process
47/55
http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec5#ch06lev1sec5http://my.safaribooksonline.com/158705115X/ch06#ch06http://my.safaribooksonline.com/158705115X/ch06lev1sec2#ch06lev4sec2 -
8/12/2019 The Attack Process
48/55
http://www.atstake.com/research/tools/network_utilities/ -
8/12/2019 The Attack Process
49/55
-
8/12/2019 The Attack Process
50/55
http://monkey.org/~dugsong/dsniff/ -
8/12/2019 The Attack Process
51/55
http://ettercap.sourceforge.net/ -
8/12/2019 The Attack Process
52/55
http://www.caida.org/analysis/security/code-red/http://www.cert.org/advisories/CA-2001-19.htmlhttp://www.cert.org/advisories/CA-1999-04.html -
8/12/2019 The Attack Process
53/55
http://www.cert.org/advisories/CA-2001-26.html -
8/12/2019 The Attack Process
54/55
http://www.chkrootkit.org/ -
8/12/2019 The Attack Process
55/55
http://bo2k.sourceforge.net/