the shadow code is not really needed, hping can be used as well specifying the protocol and setting the ttl, i have dumps from both SC and hping for those interested in making ids sigs from it...ask and i`ll send
-----Original Message----- From: Shagghie [mailto:[EMAIL PROTECTED] Sent: Friday, July 18, 2003 1:01 PM To: [EMAIL PROTECTED] Subject: [Full-Disclosure] Cisco DoS exploit URL Better late than never. https://ialert.idefense.com/idcontent/2003/Exploit Code/shadowchode.tar.gz needs this of course: http://www.packetfactory.net/libnet/. -shag _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
