On Tue, 11 Jun 2013 15:38:45 -0400, "David Edelman" said: > I can just see someone spoofing a packet from victimA port 7/UDP to victimB > port 19/UDP.
For a while, it was possible to spoof packets to create a TCP connection from a machine's chargen port to its own discard port and walk away while it burned to the ground. Fun times.
pgpDMylGGUUiq.pgp
Description: PGP signature