In this chapter, a number of tools are required to finish the attack experiments. They are mostly open source and freely available under the GNU General Public License (GPL) (http://www.gnu.org/copyleft/gpl.html). Therefore, it is not difficult to modify the tools to suit one’s particular need.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
Eric Vyncke and Christopher Paggen, “LAN Switch Security: What Hackers Know About Your Switches,” Cisco Press, Sep 2007.
Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky, and Janis N. Vizulis, “Hacking Exposed Cisco Networks: Cisco Security Secrets and Solutions,” McGraw-Hill Osborne, Jan 2006.
Stuart McClure , Joel Scambray, and George Kurtz, “Hacking Exposed: Network Security Secrets and Solutions,” McGraw-Hill Osborne, 5 edition , 1 May 2005.
Angela Orebaugh, Gilbert Ramirez, and Jay Beale, “Wireshark & Ethereal Network Protocol Analyzer Toolkit,” Syngress, Sept. 2006.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Wong, A., Yeung, A. (2009). Experiments for Illustrating Network Infrastructure Attacks. In: Network Infrastructure Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0166-8_5
Download citation
DOI: https://doi.org/10.1007/978-1-4419-0166-8_5
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-0165-1
Online ISBN: 978-1-4419-0166-8
eBook Packages: Computer ScienceComputer Science (R0)