Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 May 1996 02:05:44 -0700
From:      "Michael L. VanLoon -- HeadCandy.com" <michaelv@HeadCandy.com>
To:        "Charles C. Figueiredo" <marxx@apocalypse.superlink.net>
Cc:        "Brett L. Hawn" <blh@nol.net>, current@freebsd.org
Subject:   Re: freebsd + synfloods + ip spoofing 
Message-ID:  <199605210905.CAA13074@MindBender.HeadCandy.com>
In-Reply-To: Your message of Mon, 20 May 96 21:02:49 -0400. <Pine.BSF.3.91.960520205423.709A-100000@apocalypse.superlink.net> 

next in thread | previous in thread | raw e-mail | index | archive | help

>and the such need to generate their own headers. Besides, unless your
>clueless losers and lame crackers gain root, they can't open raw sockets.

Any PC with an ethernet card on the network can open "raw" packets.

And they might not even have to be there while the sniffer collects
data.  I've seen the consequences first-hand.

-----------------------------------------------------------------------------
  Michael L. VanLoon                                 michaelv@HeadCandy.com
        --<  Free your mind and your machine -- NetBSD free un*x  >--
    NetBSD working ports: 386+PC, Mac 68k, Amiga, Atari 68k, HP300, Sun3,
        Sun4/4c/4m, DEC MIPS, DEC Alpha, PC532, VAX, MVME68k, arm32...
    NetBSD ports in progress: PICA, others...

   Roll your own Internet access -- Seattle People's Internet cooperative.
                  If you're in the Seattle area, ask me how.
-----------------------------------------------------------------------------



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199605210905.CAA13074>