a few links about this subject:


Defining Strategies to Protect Against TCP SYN Denial of Service Attacks
(has also basic explanations)
http://www.cisco.com/warp/public/707/4.html

Characterizing and Tracing Packet Floods Using Cisco Routers
http://www.cisco.com/warp/public/707/22.html

For detailled information how the different tools work you can use the
search function on http://www.cert.org (watch word-wrap):

http://search.cert.org/query.html?rq=0&col=allcert&ht=0&qp=&qt=tcp+syn+attack&qs=&qc=&pw=100%25&ws=1&la=&qm=0&st=1&nh=25&lk=1&rf=2&oq=&rq=0&si=1

hth

Reinhold


-- 
Reinhold Fischer                  [EMAIL PROTECTED]
CCNP/SunCSA/HP Certified Consultant for Network Management



On Sat, 18 Nov 2000, Pradeep Kumar wrote:

> Hi folks,
> 
> I need to know how to :-
> - simullate a SYN attack ?
> - How SYN attack actually works.
> 
> Any information will be appreciated.
> 
> Regards All.
> Pradeep
> ___________________________________________________________________________
> Visit http://www.visto.com/info, your free web-based communications center.
> Visto.com. Life on the Dot.
> 
> _________________________________
> FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> 
> 

_________________________________
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to