中间人攻击(MITM)---常见攻击方法及原理

相关学习资料

 

http://www.cnblogs.com/LittleHann/p/3733469.html
http://www.cnblogs.com/LittleHann/p/3738141.html
http://www.cnblogs.com/LittleHann/p/3741907.html
http://www.cnblogs.com/LittleHann/p/3708222.html
http://www.icylife.net/blog/?p=371&replytocom=3140
http://www.thoughtcrime.org/software/sslstrip/
http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
http://hi.baidu.com/fairex/item/1bc33bda9bd177e5795daacc
http://hi.baidu.com/fooying/item/8198ebd71f86cb4afa576874
http://blog.ivanristic.com/2011/10/mitigating-the-beast-attack-on-tls.html
http://blog.csdn.net/jimmyleeee/article/details/7029435
http://www.butian.org/server/2543.html
http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html
http://www.freebuf.com/articles/web/5636.html
https://github.com/trustedsec/social-engineer-toolkit/
http://www.freebuf.com/tools/7841.html
http://security.zdnet.com.cn/security_zon

版权声明:本文为daibaohui原创文章,遵循CC 4.0 BY-SA版权协议,转载请附上原文出处链接和本声明。