Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Inter-protocol_exploitation> ?p ?o. }
Showing items 1 to 29 of
29
with 100 items per page.
- Inter-protocol_exploitation abstract "Inter-protocol exploitation is a security vulnerability that takes advantage of interactions between two communication protocols, for example the protocols used in the Internet. It is commonly discussed in the context of the Hypertext Transfer Protocol (HTTP). This attack uses the potential of the two different protocols meaningfully communicating commands and data.It was popularized in 2007 and publicly described in research of the same year. The general class of attacks that it refers to has been known since at least 1994 (see the Security Considerations section of RFC 1738). Internet protocol implementations allow for the possibility of encapsulating exploit code to compromise a remote program which uses a different protocol. Inter-protocol exploitation can utilize inter-protocol communication to establish the preconditions for launching an Inter-protocol exploit. For example, this process could negotiate the initial authentication communication for a vulnerability in password parsing. Inter-protocol exploitation is where one protocol attacks a service running a different protocol. This is a legacy problem because the specifications of the protocols did not take into consideration an attack of this type.".
- Inter-protocol_exploitation wikiPageExternalLink wade_alcorn_metasploit_interview.
- Inter-protocol_exploitation wikiPageID "14005182".
- Inter-protocol_exploitation wikiPageRevisionID "542631823".
- Inter-protocol_exploitation hasPhotoCollection Inter-protocol_exploitation.
- Inter-protocol_exploitation subject Category:Computer_network_security.
- Inter-protocol_exploitation subject Category:Computer_security.
- Inter-protocol_exploitation subject Category:Computer_security_exploits.
- Inter-protocol_exploitation subject Category:E-commerce.
- Inter-protocol_exploitation subject Category:Injection_exploits.
- Inter-protocol_exploitation subject Category:Secure_communication.
- Inter-protocol_exploitation type Abstraction100002137.
- Inter-protocol_exploitation type Accomplishment100035189.
- Inter-protocol_exploitation type Act100030358.
- Inter-protocol_exploitation type Action100037396.
- Inter-protocol_exploitation type ComputerSecurityExploits.
- Inter-protocol_exploitation type Event100029378.
- Inter-protocol_exploitation type Feat100036762.
- Inter-protocol_exploitation type InjectionExploits.
- Inter-protocol_exploitation type PsychologicalFeature100023100.
- Inter-protocol_exploitation type YagoPermanentlyLocatedEntity.
- Inter-protocol_exploitation comment "Inter-protocol exploitation is a security vulnerability that takes advantage of interactions between two communication protocols, for example the protocols used in the Internet. It is commonly discussed in the context of the Hypertext Transfer Protocol (HTTP). This attack uses the potential of the two different protocols meaningfully communicating commands and data.It was popularized in 2007 and publicly described in research of the same year.".
- Inter-protocol_exploitation label "Inter-protocol exploitation".
- Inter-protocol_exploitation sameAs m.03cqs6m.
- Inter-protocol_exploitation sameAs Q17056705.
- Inter-protocol_exploitation sameAs Q17056705.
- Inter-protocol_exploitation sameAs Inter-protocol_exploitation.
- Inter-protocol_exploitation wasDerivedFrom Inter-protocol_exploitation?oldid=542631823.
- Inter-protocol_exploitation isPrimaryTopicOf Inter-protocol_exploitation.