Security Incidents mailing list archives

Attack Signature Reprodution


From: Alexandre Soares <asoares () TECHNOCHANNEL COM>
Date: Fri, 5 Jan 2001 23:22:24 -0800

So,

        I write a little article about attacks using ICMP protocol, to made it I
develop a program where is possible load the field with any data, the main
function this program is show the technical form used for hackers, so my
questions is using the information present in www.whitehats.com and put the
signature in my packet I can reproduce the attack ?

        Sorry about this stupid question, and my horrible english too, but I
working so hard every day to improve my english,

Alexandre Soares


Current thread: