Hanson, Jeffrey P (GEI, GEFA) wrote:

And what happens when the attacker spoofs someone else's address and makes it look like it's coming from, oh, I don't know, the FBI site or something? Now you're scanning the FBI. Probably not a good idea.



I don't think anyone would 'scan' with a false source address, since they won't get any replies .

DoS-attacks on the other hand......that's a different story :)

might do an automatical reverse lookup, and if nothing returns, a scan might be safe, otherwise just keep the logs for reference, retribution and manual surveillance.

Sincerely
Max

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to