Network stack (dode) - attack patterns on each layer & how to defend it
From Computing and Software Wiki
(Difference between revisions)
Line 1: | Line 1: | ||
- | |||
- | |||
- | |||
- Application/Presentation | - Application/Presentation | ||
- | |||
- | - Transport: transports | + | - Transport: transports packets to the correct protocol |
+ | |||
+ | |||
+ | - Network: | ||
+ | |||
+ | IP: routed | ||
+ | |||
+ | IPX: not routed | ||
+ | |||
- | - | + | - Data link: Drive data to correct protocols |
- | |||
- | - Physical | + | - Physical: mcaddress |
Revision as of 18:17, 22 March 2008
- Application/Presentation
- Transport: transports packets to the correct protocol
- Network:
IP: routed
IPX: not routed
- Data link: Drive data to correct protocols
- Physical: mcaddress