Linux & Windows Tips, Tutorials, , Ideas

Attacking The DNS Protocol

Attacking the DNS Protocol– Security Paper v2
• Typical DNS Attacks
• Cache Poisoning using DNS  Transaction ID Prediction
• Example of a Cache Poisoning Attack on a DNS Server
• Example of a Cache Poisoning Attack on a DNS Server
• DNS Vulnerabilities in Shared Host Environments
• Example DNS Flooding – Creating a DNS Denial of Service Attack
• DNS Man in the Middle Attacks DNS Hijacking
Security Associates Institute. All Rights Reserved
Permission is granted to freely copy, distribute and/or modify this document

Read more about Attacking The DNS Protocol

Share Button

Hacking.Exposed.Linux.3rd.Edition

ABOUT THE AUTHORS
This book was written according to the ISECOM (Institute for Security and Open
Methodologies) project methodology. ISECOM is an open, nonprofit security research
and certification organization established in January 2001 with the mission to make sense
of security. They release security standards and methodologies under the Open
Methodology License for free public and commercial use.
This book was written by multiple authors, reviewers, and editors—too many to all
be listed here—who collaborated to create the best Linux hacking book they could. Since
no one person can master everything you may want to do in Linux, a community wrote
the book on how to secure it.
The following people contributed greatly and should be recognized.

Read more about Hacking.Exposed.Linux.3rd.Edition

Share Button

Basic MikroTik RouterOS Configuration using winbox .

This article ex”plains’ ho\”w to c\’onfigure a Mikrotik device straight out of the box. It goes through the Winbox configuratoin utility and some of the basic setup procedures to turn your MikroTik device into a home or office wireless and wired router. In this tutorial we will go through a step by step guide to make it as simple as possible to learn and implement these setting s on your own routers.

Read more about Basic MikroTik RouterOS Configuration using winbox .

Share Button

Linux Networking Cookbook

Linux Networking Cookbook ™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titlesRead more about Linux Networking Cookbook[…]

Share Button

Linux Network Administrators Guide

  This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration. The possible range of topics to cover is nearly limitless, so of courseRead more about Linux Network Administrators Guide[…]

Share Button

Linux Shell Scripting Cookbook

  Don’t neglect the shell – this book will empower you to use simple commands to perform complex tasks. Whether you’re a casual or advanced Linux user, the cookbook approach makes it all so brilliantly accessible and, above all, useful.   DOWNLOAD

Share Button