RE: [gini] Assignment 3 - Experiment, Step 6

2008-10-23 Thread Arin Soyen
Hello,

Thanks for the help, I will work on that.

Best,
Arin

From: muthucumaru maheswaran [EMAIL PROTECTED]
Sent: Thursday, October 23, 2008 8:38 PM
To: Arin Soyen
Cc: [EMAIL PROTECTED]; gini@cs.mcgill.ca
Subject: Re: [gini] Assignment 3 - Experiment, Step 6

In the first case, we have host D as the only reflector.
In the second case, increase the number of reflectors to while
maintaining roughly
the same total packet rate. One easy way is to use hosts from the
same subnet as
D as additional reflectors.

Hope this helps.



On 23-Oct-08, at 7:35 PM, Arin Soyen wrote:

> Hello,
>
> In the first part of the step 6 we have "Generate a TCP SYN packet
> flood from host A towards host D and spoof the source address of
> the flooding packets to host I" which means from host A we have to
> execute the command:
>
> "> hping2 -a host_I_IP -S host_D_IP"
>
> This is all OK until the second part of the step in which we are
> told to "Increase the number of reflectors for the above attack to
> host I while keeping.." which does not make sense to me and for
> which there is no command.
>
> Maybe the first part should say "...towards host I with the spoofed
> address of host D", because we can execute:
>
> "> hping2 -a host_D_IP -a host_E_IP -S host_I_IP"
>
> which increments the number of spoofed addresses attacking I.Is
> this what is meant by the first and second parts?
>
> Thank you,
> Arin
>
> ___
> gini mailing list
> gini@cs.mcgill.ca
> http://mailman.cs.mcgill.ca/mailman/listinfo/gini

___
gini mailing list
gini@cs.mcgill.ca
http://mailman.cs.mcgill.ca/mailman/listinfo/gini


Re: [gini] Assignment 3 - Experiment, Step 6

2008-10-23 Thread muthucumaru maheswaran


In the first case, we have host D as the only reflector.
In the second case, increase the number of reflectors to while  
maintaining roughly
the same total packet rate. One easy way is to use hosts from the  
same subnet as

D as additional reflectors.

Hope this helps.



On 23-Oct-08, at 7:35 PM, Arin Soyen wrote:


Hello,

In the first part of the step 6 we have "Generate a TCP SYN packet  
flood from host A towards host D and spoof the source address of  
the flooding packets to host I" which means from host A we have to  
execute the command:


"> hping2 -a host_I_IP -S host_D_IP"

This is all OK until the second part of the step in which we are  
told to "Increase the number of reflectors for the above attack to  
host I while keeping.." which does not make sense to me and for  
which there is no command.


Maybe the first part should say "...towards host I with the spoofed  
address of host D", because we can execute:


"> hping2 -a host_D_IP -a host_E_IP -S host_I_IP"

which increments the number of spoofed addresses attacking I.Is  
this what is meant by the first and second parts?


Thank you,
Arin

___
gini mailing list
gini@cs.mcgill.ca
http://mailman.cs.mcgill.ca/mailman/listinfo/gini


___
gini mailing list
gini@cs.mcgill.ca
http://mailman.cs.mcgill.ca/mailman/listinfo/gini