On Mon, 08 Mar 2004 13:51:48 -0500, [EMAIL PROTECTED] wrote: > >On Mon, 08 Mar 2004 12:03:43 EST, Cael Abal <[EMAIL PROTECTED]> said: > >> 1) Kiddie probes/attacks Symbiot-protected network. >> >> 2) Symbiot-protected network retaliates, temporarily bringing down >> kiddie's computer. > >1) Black hat probes/attacks Symbiot-protected network to cause a DoS. > >2) Symbiot reverse-attacks the forged source of attacks. > >3) Men In Black stop by to pick up the servers to investigate the attack on >a TLA. Mission Accomplished.. :) >
1) Black hat probes/attacks Symbiot-protected network to cause a DoS. 2) Symbiot reverse-attacks the forged source of attacks, another Symbiot-protected network. 3) The two Symbiot-protected networks counter-attack each other in endless loop. Double the pleasure, double the fun. :):) It's an old trick to anyone who has got two autoresponders into a loop by forging a sender address and to any mailing list manager who have had subscribers with misconfigured vacation replies. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
