Description: Most Network Security tools are proactive in nature i.e. they watch the network, get triggered by some event which happens on the network and then react to it. Due to the nature of this exercise it is possible to conceptualize the above in the form of an event driven framework. In this video series we will look at the Architecture of a Proactive security tool and how to go about programming it. Links:<br><br>1. Posix Thread Basics<br><br>2. Beej's IPC Guide<br><br>3. Packet Injection Basics<br><br>4. Packet Sniffing Basics<br><br>5. ARP DoS tool<br><br>
Tags: programming ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.