Hi, > What would be the point of spoofing the source IPs to be identical? You're > just making the attack trivial to block. Plus you could never do any kind of > TCP session attack, since you can't complete a handshake. I would have to > call this sort of attack a LAAADDoS (Lame Attempt At A DDoS). :)
perhaps spoofing an IP that cannot be blocked as its one that needs to be allowed for the site IT to operate? some cloud service IP or such.... ? alan