{"guid":"import-e998285d2df414cb5a","title":"Verdeckte Netzwerkanalyse","subtitle":null,"slug":"019_Verdeckte_Netzwerkanalyse","link":"http://www.ccc.de/congress/2004/fahrplan/event/19.en.html","description":"Es gibt relativ viele Möglichkeiten passiv fastzustellen, mit welchem Betriebssystem man sich gerade \"unterhält\". Die theoretischen Grundlagen des Fingerprintings und einige Tools werden vorgestellt. Einige Tipps zur Abhilfe (hide myself) werden ebenfalls gegeben.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":5,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:17:12.079+02:00","length":3511,"duration":3511,"thumb_url":"https://static.media.ccc.de/media/congress/2004/019 Verdeckte Netzwerkanalyse.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/019 Verdeckte Netzwerkanalyse_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-e998285d2df414cb5a-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-e998285d2df414cb5a-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/019_Verdeckte_Netzwerkanalyse","url":"https://api.media.ccc.de/public/events/import-e998285d2df414cb5a","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":776,"event_guid":"import-eae4fa54c6a772aa28","weight":2},{"event_id":890,"event_guid":"import-8d9e61b46e671e228e","weight":2},{"event_id":901,"event_guid":"import-88982546e6a87804cc","weight":2}],"recordings":[{"size":129,"length":3511,"mime_type":"audio/mpeg","language":"eng","filename":"019 Verdeckte Netzwerkanalyse.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":496,"height":368,"updated_at":"2014-05-10T15:26:32.176+02:00","recording_url":"https://cdn.media.ccc.de/congress/2004/audio/019 Verdeckte Netzwerkanalyse.mp3","url":"https://api.media.ccc.de/public/recordings/1388","event_url":"https://api.media.ccc.de/public/events/import-e998285d2df414cb5a","conference_url":"https://api.media.ccc.de/public/conferences/21c3"},{"size":129,"length":3511,"mime_type":"video/mp4","language":"eng","filename":"019 Verdeckte Netzwerkanalyse.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:12.745+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/019 Verdeckte Netzwerkanalyse.mp4","url":"https://api.media.ccc.de/public/recordings/1387","event_url":"https://api.media.ccc.de/public/events/import-e998285d2df414cb5a","conference_url":"https://api.media.ccc.de/public/conferences/21c3"}]}