A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Misusing TCP Timestamps
2015
Zenodo
Before any attack is launched an attacker tries to get as much information about the target as possible. It will be done by passive information gathering like Google dorking [1] as well as active information gathering, like port scanning [2]. Information gathering using TCP timestamps is considered active information gathering, since it interacts directly with the systems. First we will take a closer look at what TCP timestamps are and how they work. Then we will discuss ways how TCP timestamps
doi:10.5281/zenodo.3521431
fatcat:faqp5fouavcvdljkeeyo6iknpu