On 08/03/2015 05:40 AM, Mel Beckman wrote:
What would be the point of spoofing the source IPs to be identical?
You're just making the attack trivial to block.  Plus you could never
do any kind of TCP session attack, since you can't complete a
handshake. I would have to call this sort of attack a LAAADDoS (Lame
Attempt At A DDoS).:)

Reflection attack as a secondary goal against the spoofed source IP? Primary goal would be a SYN flood of many servers.

Reply via email to