I'm probably dead wrong on this, but I thought the DOS attacks in Nessus
had to do with actually taking the service in question down; not so much
network related activity as actually making the service go away.

-Tim

Dombrowski, Stan wrote:
> A DOS attack…. I’m trying to test a new product we just purchased. It’s
> a Packeteer which will recognize and deal with unusal traffic flow and
> bandwidth problems. We experienced several internal DOS attacks from
> internal hosts caused by bots. I’ve configured the Packeteer but haven’t
> found a way to test the device. I have it set up on a private  vlan with
> just the nessus server/client, the Packeteer and a test host. But
> running the normal scan with DOS enabled doesn’t generate much traffic.
> How do I crank it up to really eat up the bandwidth and emulate an
> attack. No animals will be used in this experiment and it is safe for
> childrens consumption as required by the FDA. Appreciate any help as I
> just downloaded this software and am a newbie.
> 
>  
> 
> stan
> 
> --------------------------------------------------------------------------------
> This e-mail message is intended only for the personal use of the recipient(s)
> named above. If you are not an intended recipient, you may not review, copy or
> distribute this message. If you have received this communication in error,
> please notify the San Francisco Chronicle by sending a message from this 
> feedback page: http://sfgate.com/feedback/ and delete the original message.
> 
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Nessus mailing list
> [email protected]
> http://mail.nessus.org/mailman/listinfo/nessus


_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to