Monitoring system logs using the Logcheck
Keywords:
man-in-the-middle, dnsspoof, 802.11, wireless networkAbstract
The article describes an attack mitm /man-in-the-middle/ along with redirecting DNS traffic on the selected machine. Discuss the process allows you to trace the path of the attacker. Network administrators will be able to carefully look at the problem in relation to their own network resources.Downloads
Published
2014-12-30
How to Cite
WOŁOSZYN, J. (2014). Monitoring system logs using the Logcheck. Journal of Education, Technology and Computer Science, 10(2), 419–424. Retrieved from https://journals.ur.edu.pl/jetacomps/article/view/6627
Issue
Section
ICT IN EDUCATIONAL RESEARCH
License
Copyright (c) 2014 Journal of Education, Technology and Computer Science
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.