root toor
arnold bpbthisisvulnerable2015
ARNOLD: see also sqlmap, the first page has a good description.
ARNOLD: see also A good note on IPv6 Addresses, or At IBM To summarize the unicast addresses:
ARNOLD: Transport vs Tunnel Mode
ARNOLD: AH vs ESP
ARNOLD: SAD vs SPD
ARNOLD: This short note,
ARNOLD: Understanding WEP and its Vulnerabilities
See especially the very brief summary in section IV Collisions. The rule is: It is difficult to get crypto right, even using
good crypto primitives well is difficult.
Another quick, high level explanation
ARNOLD: see also Introduction in the Wikipedia Article as well as Onion Routing