To use a tactic often used in the Navy, decoy packets are sent out along
with the legit packets to help hide the attackers position. Check nmap for
example.
Or, it could be someone writing a new cracking tool that writes raw packets,
he is using you as a target, and he has a bug in his code.
-----Original Message-----
From: mcobb [mailto:[EMAIL PROTECTED]]
Sent: Friday, May 04, 2001 7:32 PM
To: [EMAIL PROTECTED]
Subject: How can this be?
Guru's,
Iam getting port 80 scans from IP address 0.8.130.60! Has someone hung a
machine
off the Inet in promicous mode with a bogus IP address? How can this even
route? Better
yet, how does it even bind to the adapter?
To coin an oft used Naval phrase, WTFO!
Regards
Mike
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
*****************************************************************************
The information in this email is confidential and may be legally privileged.
It is intended solely for the addressee. Access to this email by anyone else
is unauthorized.
If you are not the intended recipient, any disclosure, copying, distribution
or any action taken or omitted to be taken in reliance on it, is prohibited
and may be unlawful. When addressed to our clients any opinions or advice
contained in this email are subject to the terms and conditions expressed in
the governing KPMG client engagement letter.
*****************************************************************************
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]