|
[1] S. M. Bellovin. “Security Problems in the TCP/IP Protocol Suite”. 1989. [2] Florian Weimer. “Passive DNS Replication”. 2004. [3] Annie I. Antón, Julia B. Earp, Jessica D. Young. “How Internet Users’ Privacy Concerns Have Evolved since 2002”. 2009. [4] Cynthia Wagner, Jérôme François, Radu State, Thomas Engel. “SDBF: Smart DNS Brute-Forcer”. 2012. [5] 胡榮貴、許成喜、汪永益、張亮. “马?科夫链在域名信息探测中的应用”. 2015. [6] Udi Manber, Gene Myers . “Suffix arrays: A new method for on-line string searches”. 1990 [7] “DataLossDB”. Retrieved May 6, 2016, from https://blog.datalossdb.org/ [8] “Beanstalkd”. Retrieved May 6, 2016, from https://github.com/kr/beanstalkd [9] “DNSenum”. Retrieved May 6, 2016, from http://tools.kali.org/information-gathering/dnsenum [10] “Fierce”. Retrieved May 6, 2016, from http://tools.kali.org/information-gathering/fierce [11] “theHarvester”. Retrieved May 6, 2016, from https://github.com/ laramies/theHarvester [12] OWASP. “DirBuster”, Retrieved May 6, 2016, from https://www.owasp.org/ index.php/Category:OWASP_DirBuster [13] “DNSDB”. Retrieved May 6, 2016, from https://dnsdb.info/
|