-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

man nmap. Read. Learn. Spoof. :) Or, if you're in a hurry, nmap -D
.

- -----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, November 20, 2001 12:35 AM
To: [EMAIL PROTECTED]
Subject: Using Nmap to send Spoofed packets


Hey people,

I read an article at http://www.sans.org/top20.htm that said that
ontop of 
the portscanning abilities of nmap, it also has the functionality to
"send 
decoy packets or spoofed packets to test for" spoofed IP filtering
(at the 
routers and firewall).

Although I have used Nmap to for the obvious, I am interested of how
to 
execute this functionality to test for, or if the anti-spoofing
ACL/FW 
drop filters are inplace for internal, reserved, mulitcast, and
RFC1918 
addresses.

Any help appreciated... :)

Regards,
Nick

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4

iQA/AwUBO/rVrOa2P6TrxG1EEQIwPwCg7dcGRukX6pcwBHCJXtd2kfOlLf8AnRV9
3deaiVx+3x8hCLZ8saO0cjzd
=hepQ
-----END PGP SIGNATURE-----

Attachment: PGPexch.htm.asc
Description: PGPexch.htm.asc

Reply via email to