09.12.2012 Views

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

Hack Attacks Testing How to Conduct Your - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

370 Chapter 11<br />

The remote host has the following MAC address on its adapter:<br />

0x00 0xaa 0x00 0xbd 0x8e 0x7a<br />

If you do not want <strong>to</strong> allow everyone <strong>to</strong> find the NetBios name of your computer, you<br />

should filter incoming traffic <strong>to</strong> this port.<br />

Risk fac<strong>to</strong>r: Medium<br />

Information found on port general/udp<br />

For your information, here is the trace route <strong>to</strong> 192.168.0.48:<br />

192.168.0.48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!