Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
5Activity
0 of .
Results for:
No results containing your search query
P. 1
Protection Des Pro Toc Oles

Protection Des Pro Toc Oles

Ratings: (0)|Views: 37 |Likes:
Published by dualcorefree
By T@rik
By T@rik

More info:

Published by: dualcorefree on Oct 08, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

10/25/2012

pdf

text

original

 
ROYAUME DU MAROC
Office de la Formation Professionnelle et de la Promotion du TravailD
IRECTION
ECHERCHE
 
ET
I
NGENIERIE
 
DE
F
ORMATION
SECTEUR NTIC
Protection des protocoles
 
ROYAUME DU MAROC
Office de la Formation Professionnelle et de la Promotion du TravailD
IRECTION
ECHERCHE
 
ET
I
NGENIERIE
 
DE
F
ORMATION
SECTEUR NTIC
 
Titre du document
Sommaire
1. Introduction ..........................................................................................22. Description d’attaques sur différents protocoles et .....................................22.1. Dynamic Host Configuration Protocol – DHCP ......................................22.1.1. Attaque par épuisement de ressources ...........................................22.1.2. 9.1.2. Faux serveurs DHCP ...........................................................22.1.3. 9.1.3. Comment s’en protéger ? ....................................................32.2. Domain Name Service – DNS ............................................................32.2.1. Le DNS ID spoofing .....................................................................32.2.2. Le DNS cache poisoning ..............................................................52.3. FTP ................................................................................................62.3.1. Le serveur FTP anonyme ..............................................................72.3.2. Boucing attack - Attaque par rebonds ............................................72.3.3. Comment s’en protéger ? .............................................................72.4. HTTP ..............................................................................................82.4.1. Les serveurs trop bavards ............................................................82.4.2. Vulnérabilités liées aux applications web .........................................82.4.3. Comment se protéger ? ................................................................9
OFPPT @
DocumentMillésimePage
23126676.docdécembre 07
1 - 12

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
Walid_Sassi_Tun liked this
ing_404 liked this
Zan Layle liked this
Zan Layle liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->