IMHO if your firewall is set up properly you will be able to block all the scanning 
packets.  I know for a fact that freebsd's IPF is cabable of blocking the packets.  
and how to do it...well RTFMP.  look under decoy

Hope this helps

On Tue, Nov 20, 2001 at 02:35:08PM +0800, [EMAIL PROTECTED] wrote:
> Hey people,
> 
> I read an article at http://www.sans.org/top20.htm that said that ontop of 
> the portscanning abilities of nmap, it also has the functionality to "send 
> decoy packets or spoofed packets to test for" spoofed IP filtering (at the 
> routers and firewall).
> 
> Although I have used Nmap to for the obvious, I am interested of how to 
> execute this functionality to test for, or if the anti-spoofing ACL/FW 
> drop filters are inplace for internal, reserved, mulitcast, and RFC1918 
> addresses.
> 
> Any help appreciated... :)
> 
> Regards,
> Nick

Reply via email to