WordNet
- something intended to misrepresent the true nature of an activity; "he wasnt sick--it was just a subterfuge"; "the holding company was just a blind" (同)blind
PrepTutorEJDIC
- 〈C〉いい逃れ,口実;ごまかし / 〈U〉策略,諜略
Wikipedia preview
出典(authority):フリー百科事典『ウィキペディア(Wikipedia)』「2016/06/11 11:04:50」(JST)
[Wiki en表示]
|
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (June 2014) (Learn how and when to remove this template message) |
|
The topic of this article may not meet Wikipedia's general notability guideline. Please help to establish notability by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond its mere trivial mention. If notability cannot be established, the article is likely to be merged, redirected, or deleted.
Find sources: "Subterfuge" – news · newspapers · books · scholar · JSTOR · free images (January 2016) (Learn how and when to remove this template message) |
For the concept of subterfuge, see Deception and Military deception. For the 1968 British film, see Subterfuge (film).
For the 1912 film, see Subterfuge (1912 film).
Subterfuge
|
Original author(s) |
r00t0v3rr1d3 (Chris Shields), 0sm0s1z (Matthew Toussain) |
Initial release |
July 23, 2012; 3 years ago (2012-07-23) |
Stable release |
5.0.8 / March 22, 2013; 3 years ago (2013-03-22) |
Development status |
Active |
Written in |
Python |
Operating system |
Linux |
Available in |
English |
Type |
Computer security |
License |
GNU General Public License |
Website |
http://www.kinozoa.com (defunct) |
Subterfuge is a free and open source network security framework to demonstrate man-in-the-middle attacks and make it as simple as point and shoot.[1] Subterfuge demonstrates vulnerabilities in the Address Resolution Protocol by harvesting credentials that go across the LAN, and even exploiting machines through client-side browser injection. It is capable of running on all distributions of Linux, but developer support is limited to Kali Linux. It is capable of leveraging multiple man-in-the-middle attacks against target networks.
Contents
- 1 Features
- 2 Graphical interface
- 3 References
- 4 External links
Features
Subterfuge Features include:
- ARP Cache Poisoning
- Credential Harvester
- Http Code Injection
- Wireless AP Generation
- WPAD Hijacking
- Rogue DHCP
Graphical interface
Subterfuge is known for its extremely modern web-based interface. The interface includes alternate perspectives for man-in-the-middle attacks through its unique network view. Subterfuge and its GUI’s purpose are primarily to demonstrate the dangers of man-in-the-middle attacks through their ease of employment with the framework itself.
References
- ^ "Subterfuge (Man-in-the-Middle Attack Framework)". Raj Chandler. 12 December 2012. Retrieved 18 November 2013.
External links
- Official website
- Project Page
English Journal
- 'One mission accomplished, more important ones remain': commentary on Every-Palmer, S., Howick, J. (2014) How evidence-based medicine is failing due to biased trials and selective publication. Journal of Evaluation in Clinical Practice, 20 (6), 908-914.
- Wyer P1, Alves da Silva S.
- Journal of evaluation in clinical practice.J Eval Clin Pract.2015 Jun;21(3):518-28. doi: 10.1111/jep.12330. Epub 2015 Feb 26.
- Every-Palmer and Howick suggest that evidence-based medicine (EBM) is failing in its mission because of contamination of research by manufacturer and researcher-motivated bias and self-interest. They fail to define that mission and to distinguish between the EBM movement and the research enterprise
- PMID 25720797
- Directly observed care: can unannounced standardized patients address a gap in performance measurement?
- Weiner SJ1, Schwartz A.
- Journal of general internal medicine.J Gen Intern Med.2014 Aug;29(8):1183-7. doi: 10.1007/s11606-014-2860-7. Epub 2014 Apr 23.
- There are three potential sources of information for evaluating a clinician's performance: documentation, patient report, and directly observed care. Current measures draw on just two of these: data recorded in the medical record and surveys of patients. Neither captures an array of performance char
- PMID 24756945
- The role of glycans in immune evasion: the human fetoembryonic defence system hypothesis revisited.
- Clark GF1.
- Molecular human reproduction.Mol Hum Reprod.2014 Mar;20(3):185-99. doi: 10.1093/molehr/gat064. Epub 2013 Sep 15.
- Emerging data suggest that mechanisms to evade the human immune system may be shared by the conceptus, tumour cells, persistent pathogens and viruses. It is therefore timely to revisit the human fetoembryonic defense system (Hu-FEDS) hypothesis that was proposed in two papers in the 1990s. The initi
- PMID 24043694
- Subterfuge and sabotage: evasion of host innate defenses by invasive gram-positive bacterial pathogens.
- Okumura CY1, Nizet V.
- Annual review of microbiology.Annu Rev Microbiol.2014;68:439-58. doi: 10.1146/annurev-micro-092412-155711. Epub 2014 Jun 18.
- The development of a severe invasive bacterial infection in an otherwise healthy individual is one of the most striking and fascinating aspects of human medicine. A small cadre of gram-positive pathogens of the genera Streptococcus and Staphylococcus stand out for their unique invasive disease poten
- PMID 25002085
Japanese Journal
- どこまで現実? : 「住む」はメディアの逃げ口上(第1部|巻頭論考,<特集>住むことから考える)
- Invasion and Subterfuge in 'Frost at Midnight' ( 1798 )
- Ve-Yin Tee
- NUCB journal of language culture and communication 8(1), 103-118, 2006
- Coleridge repeatedly revised `Frost at Midnight' publishing different versions of the poem. The poem that is widely read today is actually the final version of 1829. This essay focuses instead on the …
- NAID 110004860609
- 森 真澄
- 関西医科大学雑誌 17(2), 193-204, 1965
- … The essential motives should, however, be considered rather on the side of children themselves, as these discontents seemed us as mere subterfuge.<BR>3) Though the economical state of the families of the patients was fairly good, distortion of parent-child relationship and neurotic personality structures in parents were observed in most of the cases.<BR>4) The school-phobia children were already provided with neurotic traits before the onset. …
- NAID 130004701045
Related Links
- Subterfuge no es solo una de las discográficas independientes pioneras y más sólidas de España, también desde hace años Subterfuge desarrolla labores de management y booking a través de Subterfuge Events, un ...
- Full Definition of SUBTERFUGE 1: deception by artifice or strategem in order to conceal, escape, or evade 2: a deceptive device or stratagem See subterfuge defined for English-language learners See subterfuge defined for kids
- subterfuge 【名】ごまかし、逃げ口上 - アルクがお届けする進化するオンライン英和・和英辞書データベース。一般的な単語や連語から、イディオム、専門用語、スラングまで幅広く収録。 ... 英和・和英 対訳データオンライン検索サービス
Related Pictures