RE: DoS tools

From: Aleksander Czarnowski (alekcat_private)
Date: Mon Sep 10 2001 - 06:11:59 PDT

  • Next message: Ogle Ron (Rennes): "RE: Security Audit"

    In some cases we are using nmap with settings like this:
    -sS -sR -P0 -T Insane -p1-65535 -f 
    and running its instances many times. It will not only return some
    information on open ports, but will also allow to test any filtering rules
    and reliability of tested host.  It works fine as long as you have the at
    least same bandwidth as checked host. Running to many instances on attacking
    host can also help you DoS it and check how much load it can hold ;-) Such
    setup also allows testing NIDS systems especially when nmap decoy option is
    being used. It can also be used in conjunction with other tools, like stick
    or whisker with on of its anti-ids tactics. There are also some additional
    interesting scan types like -sN or Xmas scan.
    Regards
    Aleksander Czarnowski
    AVET INS
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
    Service. For more information on SecurityFocus' SIA service which
    automatically alerts you to the latest security vulnerabilities please see:
    https://alerts.securityfocus.com/
    



    This archive was generated by hypermail 2b30 : Mon Sep 10 2001 - 07:54:45 PDT