-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
man nmap. Read. Learn. Spoof. :) Or, if you're in a hurry, nmap -D . - -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Tuesday, November 20, 2001 12:35 AM To: [EMAIL PROTECTED] Subject: Using Nmap to send Spoofed packets Hey people, I read an article at http://www.sans.org/top20.htm that said that ontop of the portscanning abilities of nmap, it also has the functionality to "send decoy packets or spoofed packets to test for" spoofed IP filtering (at the routers and firewall). Although I have used Nmap to for the obvious, I am interested of how to execute this functionality to test for, or if the anti-spoofing ACL/FW drop filters are inplace for internal, reserved, mulitcast, and RFC1918 addresses. Any help appreciated... :) Regards, Nick -----BEGIN PGP SIGNATURE----- Version: PGP 7.0.4 iQA/AwUBO/rVrOa2P6TrxG1EEQIwPwCg7dcGRukX6pcwBHCJXtd2kfOlLf8AnRV9 3deaiVx+3x8hCLZ8saO0cjzd =hepQ -----END PGP SIGNATURE----- (See attached file: PGPexch.htm.asc)
PGPexch.htm.asc
Description: Binary data