Vulnerabilities in NTP

  • Allan Liska


Having reviewed some of the issues in NTP security, the next step is to take a closer look at some of the vulnerabilities. The goal of this chapter is not to cover specific vulnerabilities, but instead look at how vulnerabilities in NTP can be exploited and the potential damage those exploits can cause to an organization.


Message Authentication Code Buffer Overflow Symmetric Encryption Target Host Thread Count 

Copyright information

© Allan Liska 2016

Authors and Affiliations

  • Allan Liska
    • 1
  1. 1.HerndonUSA

Personalised recommendations