I'm probably dead wrong on this, but I thought the DOS attacks in Nessus had to do with actually taking the service in question down; not so much network related activity as actually making the service go away.
-Tim Dombrowski, Stan wrote: > A DOS attack…. I’m trying to test a new product we just purchased. It’s > a Packeteer which will recognize and deal with unusal traffic flow and > bandwidth problems. We experienced several internal DOS attacks from > internal hosts caused by bots. I’ve configured the Packeteer but haven’t > found a way to test the device. I have it set up on a private vlan with > just the nessus server/client, the Packeteer and a test host. But > running the normal scan with DOS enabled doesn’t generate much traffic. > How do I crank it up to really eat up the bandwidth and emulate an > attack. No animals will be used in this experiment and it is safe for > childrens consumption as required by the FDA. Appreciate any help as I > just downloaded this software and am a newbie. > > > > stan > > -------------------------------------------------------------------------------- > This e-mail message is intended only for the personal use of the recipient(s) > named above. If you are not an intended recipient, you may not review, copy or > distribute this message. If you have received this communication in error, > please notify the San Francisco Chronicle by sending a message from this > feedback page: http://sfgate.com/feedback/ and delete the original message. > > > > > ------------------------------------------------------------------------ > > _______________________________________________ > Nessus mailing list > [email protected] > http://mail.nessus.org/mailman/listinfo/nessus _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
