This book excerpt is from Chapter 2 of the second edition of Firewalls and Internet Security: Repelling the Wily Hacker . This chapter, titled “A Security Review of Protocols: Lower Layers,” examines ...
I love new security testing tools. There is nothing quite like finding some magical bits of code allowing you to use and abuse protocols in unique and unnatural ways. I was introduced to Loki at ...