Finished analysis of offensive capailities (techniques from defcon finally not included, at least for now)

This commit is contained in:
h3xduck
2022-06-06 20:50:28 -04:00
parent 55378027ab
commit 92103d234e
18 changed files with 543 additions and 212 deletions

View File

@@ -47,7 +47,10 @@
\BOOKMARK [2][-]{subsection.3.3.4}{Attacks\040and\040limitations\040of\040bpf_probe_write_user\(\)}{section.3.3}% 47
\BOOKMARK [2][-]{subsection.3.3.5}{Conclusion}{section.3.3}% 48
\BOOKMARK [1][-]{section.3.4}{Abusing\040networking\040programs}{chapter.3}% 49
\BOOKMARK [2][-]{subsection.3.4.1}{Attacks\040and\040limitations\040of\040networking\040programs}{section.3.4}% 50
\BOOKMARK [0][-]{chapter.4}{Results}{}% 51
\BOOKMARK [0][-]{chapter.5}{Conclusion\040and\040future\040work}{}% 52
\BOOKMARK [0][-]{chapter.5}{Bibliography}{}% 53
\BOOKMARK [2][-]{subsection.3.4.1}{An\040overview\040on\040the\040network\040layer}{section.3.4}% 50
\BOOKMARK [2][-]{subsection.3.4.2}{Introduction\040to\040the\040TCP\040protocol}{section.3.4}% 51
\BOOKMARK [2][-]{subsection.3.4.3}{Attacks\040and\040limitations\040of\040networking\040programs}{section.3.4}% 52
\BOOKMARK [2][-]{subsection.3.4.4}{Conclusion}{section.3.4}% 53
\BOOKMARK [0][-]{chapter.4}{Results}{}% 54
\BOOKMARK [0][-]{chapter.5}{Conclusion\040and\040future\040work}{}% 55
\BOOKMARK [0][-]{chapter.5}{Bibliography}{}% 56