This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
network_security_assesment [2009/06/08 03:06] k2patel |
network_security_assesment [2009/06/08 03:37] k2patel |
||
---|---|---|---|
Line 437: | Line 437: | ||
</code> | </code> | ||
- | [[91]] | + | == Using Specific Source Ports to Bypass Filtering == |
+ | information regarding circumvention of Firewall-1 in certain\\ | ||
+ | configurations, consult the excellent presentation from Black Hat Briefings 2000 by\\ | ||
+ | Thomas Lopatic et al. titled “A Stateful Inspection of Firewall-1” available as a Real\\ | ||
+ | Media video stream and PowerPoint presentation from [[ http://www.blackhat.com/html/bh-usa-00/bh-usa-00-speakers.html | Link]] | ||
+ | |||
+ | [[96]] |