@article{hailperin_2015, title={Misusing TCP Timestamps}, DOI={10.5281/zenodo.3521431}, abstractNote={Before any attack is launched an attacker tries to get as much information about the target as possible. It will be done by passive information gathering like Google dorking [1] as well as active information gathering, like port scanning [2]. Information gathering using TCP timestamps is considered active information gathering, since it interacts directly with the systems. First we will take a closer look at what TCP timestamps are and how they work. Then we will discuss ways how TCP timestamps have been used, to then move on to how networks have changed and how that has introduced new challenges to information gathering. Last we will introduce a not previously published way to utilize TCP timestamps and also how to mitigate these attacks.}, publisher={Zenodo}, author={Hailperin, Veit}, year={2015}, month={Mar} }