1 |
Sean Whalen, An Introducation to Arp Spoofing, April 2001
|
2 |
CERTCC-KR, IP spoofing 공격과 대책, CERTCC-KR 기술문서(http://www.certcc.or .kr/a dvisory/tr/IPspoof.html)
|
3 |
Metcalfe, Robert M. and Boggs, David R. (July 1976). "Ethernet: Distributed Packet Switching for Local Computer Networks". Communications of the ACM 19 (5): pp. 395-405
DOI
|
4 |
David C. Plummer (1982-11). "RFC 826, An Ethernet Address Resolution Protocol ". Internet Engineering Task Force, Network Working Group. http://tools.ietf.org/html/rfc826.
|
5 |
Cain & Abel, http://www.oxid.it/cain.html
|
6 |
Brad Sanford, IP fragmentation and Fragrouter, http://www.sans.org/InforSecFAQ/encryption/IP_Frag.html, 2000
|
7 |
F. Risso and L. Degioanni, "An Architecture for High Performance Network Analysis", Proceedings of the Sixth IEEE Symposium on Computers and Communications, pp. 686 - 693, 2001. http://www.winpcap.org/
|
8 |
V. Jacobson, C. Leres and S. McCanne, libpcap, Lawrence Berkeley Laboratory, Berkeley, CA. Initial public release June, 1994. Available now at http://www.tcpdump.org/
|
9 |
IETF, Protocol standard for a NetBIOS service on a TCP/UDP transport: Concept and methods, RFC 1001
|
10 |
IETF, Internet Standard Subnetting Procedure, RFC 950
|
11 |
IpHlpApi Library, Microsoft Platform SDK
|
12 |
McPherson, D. and B. Dykes, "VLAN Aggregation for Efficient IP Address Allocation," RFC 3069, February 2001.
|