Escolar Documentos
Profissional Documentos
Cultura Documentos
Curso Teste de Invasão em Redes e Sistemas EAD –Aula 03– Novembro de 2013
Protocolo ARP
http://technet.microsoft.com/pt-br/library/cc758357(v=ws.10).aspx
http://www.metropoledigital.ufrn.br/aulas_avancado/web/disciplinas/rede_comp/aula_
04.html
Arp Spoofing
http://www.techopedia.com/definition/25409/address-resolution-protocol-spoofing-
arpspoofing
http://www.brainwork.com.br/blog/2012/05/28/ataque-camada-2-arp-spoofing/
Buffer Overflow
https://under-linux.org/entry.php?b=923
http://www.gris.dcc.ufrj.br/documentos/apresentacoes/buffer-overflow-uma-
introducao-teorica/at_download/file
Buffer Overflow
https://www.owasp.org/index.php/Buffer_Overflow
NOP
http://en.wikipedia.org/wiki/NOP
Metasploit
http://www.metasploit.com/
CVE
http://cve.mitre.org/
Sniffing
http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Pa
cket_sniffing/default.htm
Keyloggers
http://www.tecmundo.com.br/spyware/1016-o-que-e-keylogger-.htm
Rainbow tables
http://en.wikipedia.org/wiki/Rainbow_table
Congelamento de memória para conseguir senhas
https://citp.princeton.edu/research/memory/
Hydra
https://www.thc.org/thc-hydra/
ophcrack
http://ophcrack.sourceforge.net/
LM Hash
http://en.wikipedia.org/wiki/LM_hash
Kerberos
http://web.mit.edu/kerberos/
Burp Suite
http://portswigger.net/burp/
Métodos do Intruder do Burp Suite
http://www.danielmiessler.com/blog/burp-intruder-payloads