Part V - References & Bibliography
5.0 Overview
5.1 RFCs, Whitepapers & Internet Drafts
5.2 Microsoft Knowledge Base & Security Alerts
5.3 Books
5.4 Articles & Websites
Part VI - Additional Information – Attack Programs Source Code
6.1 Anger.c
6.2 Ntpptp.c
6.3 Deceit.c
Part 1 - General Overview
1.0 Overview
Initially this document covers, from a high level, various popular VPN
technologies and implementations. This document then proceeds to delve into
considerable depth about:
The Microsoft PPTP VPN implementation.
•
Lists several vulnerabilities in detail.
•
Demonstrates in detail 5 attacks on various versions of the most
•
common of Microsoft’s PPTP products, using free, readily
available tools
Explains what each exploit is doing and how it works.
•
0
Do'stlaringiz bilan baham: |