[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
R: [Full-Disclosure] Loopback packets
- To: <phathat@hushmail.com>
- Subject: R: [Full-Disclosure] Loopback packets
- From: "edp" <edp.lists@acerbis.it>
- Date: Tue, 19 Aug 2003 12:42:39 +0200
Bad idea to set that dns entry to loopback, you are still DoS'ing
yourself.
The worm try to syn flood 127.0.0.1 with spoofed addresses, resulting in
lotta of RST packets back from loopback.
Just create a fake empty zone, no need here of loopback addresses.
>>> ***A*R** Seq: 0x0 Ack: 0x57810001 Win: 0x0 TcpLen: 20
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html