[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] Re: [scip_Advisory] NetGear RP114 Flooding Denialof Service
- To: "Thierry Zoller" <Thierry@xxxxxxxxx>
- Subject: Re: [Full-disclosure] Re: [scip_Advisory] NetGear RP114 Flooding Denialof Service
- From: "Morning Wood" <se_cur_ity@xxxxxxxxxxx>
- Date: Tue, 13 Dec 2005 06:37:40 -0800
> MR> III. EXPLOITATION
> MR> Running TCP SYN flooding is very simple and can be realized by a large
> MR> variety of public attack tools. But it is also possible to initialize
> MR> such an attack my misusing a port scanning utility. Starting a scan
with
> MR> nmap by Fyodor with the following command is able to reproduce the
> MR> denial of service:
> MR> nmap -PS80 192.168.0.0/24
>
on the RT314 just a simple nmap -sS target
> You fail to say whether this is done from INSIDE -> OUTSIDE or vice
from both inside AND outside
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/