Full Disclosure mailing list archives

RE: Counter-Attacking hackers? (wtf)


From: List Bot <listbot () mailandnews com>
Date: Tue, 9 Mar 2004 03:17:33 -0500

On Mon, 08 Mar 2004 13:51:48 -0500, Valdis.Kletnieks () vt edu wrote:

On Mon, 08 Mar 2004 12:03:43 EST, Cael Abal <lists2 () onryou com>  said:

1) Kiddie probes/attacks Symbiot-protected network.

2) Symbiot-protected network retaliates, temporarily bringing down
kiddie's computer.

1) Black hat probes/attacks Symbiot-protected network to cause a DoS.

2) Symbiot reverse-attacks the forged source of attacks.

3) Men In Black stop by to pick up the servers to investigate the attack on
a TLA.  Mission Accomplished.. :)


1) Black hat probes/attacks Symbiot-protected network to cause a DoS.

2) Symbiot reverse-attacks the forged source of attacks, another 
Symbiot-protected network.

3) The two Symbiot-protected networks counter-attack each other in
endless loop.  Double the pleasure, double the fun. :):)

It's an old trick to anyone who has got two autoresponders into a
loop by forging a sender address and to any mailing list manager
who have had subscribers with misconfigured vacation replies.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: