In this section, we are going to discuss various weaknesses that exist within the underlying protocols of the Transport Layer.
Vulnerabilities at the Transport Layer
Fingerprinting
Whenever a crime occurs, local authorities such as the police would conduct fingerprint analysis to determine, or narrow the scope of identifying, the perpetrator. In the cyber security world, fingerprinting is a bit similar on a computer platform. Fingerprinting is used to discover open ports and services that are running open on the target system. From a hacker's point of view, fingerprinting is done before the exploitation phase, as the more information a hacker can obtain about a target, the hacker can then narrow its attack scope and use...