-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

man nmap. Read. Learn. Spoof. :) Or, if you're in a hurry, nmap -D
.

- -----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 20, 2001 12:35 AM
To: [EMAIL PROTECTED]
Subject: Using Nmap to send Spoofed packets


Hey people,

I read an article at http://www.sans.org/top20.htm that said that
ontop of
the portscanning abilities of nmap, it also has the functionality to
"send
decoy packets or spoofed packets to test for" spoofed IP filtering
(at the
routers and firewall).

Although I have used Nmap to for the obvious, I am interested of how
to
execute this functionality to test for, or if the anti-spoofing
ACL/FW
drop filters are inplace for internal, reserved, mulitcast, and
RFC1918
addresses.

Any help appreciated... :)

Regards,
Nick

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4

iQA/AwUBO/rVrOa2P6TrxG1EEQIwPwCg7dcGRukX6pcwBHCJXtd2kfOlLf8AnRV9
3deaiVx+3x8hCLZ8saO0cjzd
=hepQ
-----END PGP SIGNATURE-----

(See attached file: PGPexch.htm.asc)

Attachment: PGPexch.htm.asc
Description: Binary data

Reply via email to