>How is it the case then, is it possible to just use IP spoofing to penetrate >a system? There are DNS poison attacks that are done via UDP. I don't know if that counts as a penetration attack in your book, but it's not a simple DoS attack. TCP is not the only IP protocol that can be spoofed, just the hardest. (Well, not counting cyrptographically signed protocols :) ) Ryan
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:42:10 PDT