Hey people, I read an article at http://www.sans.org/top20.htm that said that ontop of the portscanning abilities of nmap, it also has the functionality to "send decoy packets or spoofed packets to test for" spoofed IP filtering (at the routers and firewall).
Although I have used Nmap to for the obvious, I am interested of how to execute this functionality to test for, or if the anti-spoofing ACL/FW drop filters are inplace for internal, reserved, mulitcast, and RFC1918 addresses. Any help appreciated... :) Regards, Nick
