>How is it the case then, is it possible to just use IP spoofing to penetrate >a system? IP spoofing without ISN prediction can be used to mount a SYN attack, with these benefits from the attacker's standpoint: * It hides the attacker's identity * It can allow the packets through filters that limit where connections can be initiated from Tony Rall
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:42:11 PDT