On Tue, Dec 21, 1999 at 09:08:09AM -0600, Eric wrote:
| I'm not clear on what a port scan accomplishes with a spoofed address
| unless it is just to make you think you're being scanned from elsewhere.
| If you're being scanned from a spoofed address, then whoever is trying to
| find a vulnerability will never know the result, right?
There are other uses of portscans, like getting network A to blackhole
business partner B's network because you trick A's reactive IDS
systems.
Adam
--
Tired of co-workers slowing you down? Leave them behind.
http://jobs.zeroknowledge.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
- RE: Dealing with port scanners / attackers sethw
- RE: Dealing with port scanners / attackers Parker, Gary W
- RE: Dealing with port scanners / attackers Randall, Mark
- Re: Dealing with port scanners / attackers Marc Renner
- Re: Dealing with port scanners / attackers Marc Renner
- RE: Dealing with port scanners / attackers Parker, Gary W
- Re: Dealing with port scanners / attackers John Stewart
- RE: Dealing with port scanners / attackers Ron DuFresne
- RE: Dealing with port scanners / attackers Mullen, Patrick
- Re: Dealing with port scanners / attackers Nuno Guarda
- RE: Dealing with port scanners / attackers Lee, Dana-Renee
- Re: Dealing with port scanners / attackers guja02
