Nytro Posted January 11, 2010 Report Posted January 11, 2010 This publication discusses various methodologies to use for network exploration. It discusses everything from the basics of TCP/IP to firewalking.Download:http://packetstormsecurity.org/papers/attack/Advanced_Network_Exploitation_Res_Publication_2009.pdf Quote