Penetration Testing mailing list archives
Re: Protocol Analysis
From: "Don Parker" <dparker () bridonsecurity com>
Date: Tue, 4 Jul 2006 18:35:12 -0400
Just what protocols are you referring to? Application layer ones, session layer ones,......
Salut, Don -------------------------------------------------------------- Don Parker, GCIA GCIH Intrusion Detection & Incident Handling Specialist Bridon Security & Training Services http://www.bridonsecurity.com voice: 1-613-302-2910-------------------------------------------------------------- ----- Original Message ----- From: "siddkantroo" <siddkantroo () gmail com>
To: <pen-test () securityfocus com> Sent: Tuesday, July 04, 2006 7:13 AM Subject: Protocol Analysis
Hi,Does anyone have any gud links or reading material on Protocol Analysis..</Regards S!dd.K -- Nothing is over till the moment you stop trying !!! ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.------------------------------------------------------------------------------
------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- Protocol Analysis siddkantroo (Jul 04)
- Re: Protocol Analysis Don Parker (Jul 04)
- Re: Protocol Analysis siddkantroo (Jul 05)
- Re: Protocol Analysis okrehel (Jul 05)
- Re: Protocol Analysis Karyn Pichnarczyk (Jul 06)
- Re: Protocol Analysis tcp fin (Jul 11)
- RE: Protocol Analysis David (Jul 24)
- Message not available
- Re: Protocol Analysis siddkantroo (Jul 30)
- Re: Protocol Analysis siddkantroo (Jul 05)
- Re: Protocol Analysis Don Parker (Jul 04)
- <Possible follow-ups>
- Re: Protocol Analysis jipi dini (Jul 05)