a few links about this subject:
Defining Strategies to Protect Against TCP SYN Denial of Service Attacks
(has also basic explanations)
http://www.cisco.com/warp/public/707/4.html
Characterizing and Tracing Packet Floods Using Cisco Routers
http://www.cisco.com/warp/public/707/22.html
For deta
Hi folks,
I need to know how to :-
- simullate a SYN attack ?
- How SYN attack actually works.
Any information will be appreciated.
Regards All.
Pradeep
___
Visit http://www.visto.com/info, your free web-based communication
2 matches
Mail list logo