Part II: - Specific MS PPTP Exploits
2.0 Overview
This section will cover in detail the lab configuration used for testing, the
tools used, and the steps of the exploits, and their results.
A lot more information was gathered than is included in this release of
this document. Many other operating systems and software configurations were
tested during this time period, however much of this extended information has
been left out to keep the focus of this document on the Microsoft
implementation of PPTP, and keep the size of this document down to a
manageable length for this assignment.
The actual lab notes are included in a later section in this document for
those who are interested in the more specific details of these tests.
Do'stlaringiz bilan baham: |