tool is often a useful starting point to get a feel for the amount of varia-
tion contained within a sample of tokens. However, in the authors’ expe-
rience these tools suffer from two limitations. First, they are usually only
effective when the patterns within the sample are relatively obvious and
could be quickly identified through manual analysis; they are poor at
deciphering any encoding and structure within tokens. Second, they
often produce graphical output, which gives the visual impression of
some kind of pattern, even though further analysis establishes that the
pattern is a red herring.
(continued)
Chapter 7
■
Attacking Session Management
189
70779c07.qxd:WileyRed 9/14/07 3:13 PM Page 189
Do'stlaringiz bilan baham: |