From bkmarsh@wichita.fn.net Mon Sep 16 07:29:12 1996 Received: (sendmail@localhost) by suburbia.net (8.7.4/Proff-950810) id HAA22865 for ; Mon, 16 Sep 1996 07:29:11 +1000 Received: from wichita.fn.net(204.233.71.1) via SMTP by profane.adso.com.au, id smtpd22863aaa; Sun Sep 15 21:29:03 1996 Received: (from bkmarsh@localhost) by wichita.fn.net (8.7.4/8.6.9) id QAA22019; Sun, 15 Sep 1996 16:28:49 -0500 (CDT) Date: Sun, 15 Sep 1996 16:28:48 -0500 (CDT) From: "Bruce M." X-Sender: bkmarsh@wichita.fn.net To: best-of-security@suburbia.net Subject: Re: BoS: Re: Phrack vs. RealSecure In-Reply-To: <199609150836.KAA00475@brasaap.iaehv.nl> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII On Sun, 15 Sep 1996, Rob J. Nauta wrote: > Indeed, a magazine called FEH had some very good and useable SOCK_RAW > code (the demo program sent a christmas tree packet) in issue 4, > which would be easily used to build a syn flooder and a spoofer, > and this is more than 6 months old. Just for the record though, ReDragon (the person in question who works for ISS) was also the Editor of FEH. I still don't think ISS had anything to do with the SYN floods though. ________________________________ [ Bruce M. - Feist Systems, Inc. ] ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 'DISA information shows that computer attacks on the Department of Defense are successful 65 percent of the time. The DoD, despite its problems, probably has one of the strongest computer security programs in government.' -GAO/T-AIMD-96-108