> MR> III. EXPLOITATION > MR> Running TCP SYN flooding is very simple and can be realized by a large > MR> variety of public attack tools. But it is also possible to initialize > MR> such an attack my misusing a port scanning utility. Starting a scan with > MR> nmap by Fyodor with the following command is able to reproduce the > MR> denial of service: > MR> nmap -PS80 192.168.0.0/24 >
on the RT314 just a simple nmap -sS target > You fail to say whether this is done from INSIDE -> OUTSIDE or vice from both inside AND outside _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
