Scanning the Network

  • Mike O’Leary


The web browser attacks of  Chapter 2 require the victim to visit a web site controlled by the attacker. In more realistic scenarios, the attacker needs to know some details of the target network before being able to launch attacks that have a reasonable chance of success.


Open Domain Bind Server Closed Port Network Scan Service Command 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Mike O'Leary 2015

Authors and Affiliations

  • Mike O’Leary
    • 1
  1. 1.Department of MathematicsTowson UniversityTowsonUS

Personalised recommendations