Hi,

> What would be the point of spoofing the source IPs to be identical? You're 
> just making the attack trivial to block.  Plus you could never do any kind of 
> TCP session attack, since you can't complete a handshake. I would have to 
> call this sort of attack a LAAADDoS (Lame Attempt At A DDoS). :)

perhaps spoofing an IP that cannot be blocked as its one that needs to be 
allowed for the site IT to operate? some
cloud service IP or such.... ?

alan

Reply via email to