lkpbytes.blogg.se

Documentation on bluejacking
Documentation on bluejacking













documentation on bluejacking

MITM –> intercepts legitimate traffic between 2, attacker controls info flow & can alter comm Remote access Non-blind spoofing –> attacker in the same subnet, sniffs the seq/ack numbers and hijacks the sessionīlind spoofing –> pkts sent to victim to obtain a sampling of seq numbers & generate a valid seq number for the attack (works on older systems) Noise –> interference introduced to the cables, distorts the signal –> problemsĪttenuation –> weakening of the signal as it travels down the cableĬrosstalk –> wires in parallel –> signals interfere w/ each other & distort the signalĮavesdropping –> fiber optic is the safest ! Network attacks VSAN (Virtual Storage Area Network) –> sw-defined storage that allows pooling of storage capabilities & instant/automatic provisioning of VM storage.

documentation on bluejacking

SDN (Software Defined Network) –> physical separation of network control plane from fwd plane (decisions are taken remote, not on the hardware)

documentation on bluejacking

Screen scraping is the act of copying information that shows on a digital display so it can be used for another purpose. VPN screen scraper = app that allows an attacker to capture what is on the user’s display (abernathy?)















Documentation on bluejacking