Hey people,

I read an article at http://www.sans.org/top20.htm that said that ontop of 
the portscanning abilities of nmap, it also has the functionality to "send 
decoy packets or spoofed packets to test for" spoofed IP filtering (at the 
routers and firewall).

Although I have used Nmap to for the obvious, I am interested of how to 
execute this functionality to test for, or if the anti-spoofing ACL/FW 
drop filters are inplace for internal, reserved, mulitcast, and RFC1918 
addresses.

Any help appreciated... :)

Regards,
Nick

Reply via email to