Penetration Testing mailing list archives
RE: DoS tools
From: Aleksander Czarnowski <alekc () avet com pl>
Date: Mon, 10 Sep 2001 15:11:59 +0200
In some cases we are using nmap with settings like this: -sS -sR -P0 -T Insane -p1-65535 -f and running its instances many times. It will not only return some information on open ports, but will also allow to test any filtering rules and reliability of tested host. It works fine as long as you have the at least same bandwidth as checked host. Running to many instances on attacking host can also help you DoS it and check how much load it can hold ;-) Such setup also allows testing NIDS systems especially when nmap decoy option is being used. It can also be used in conjunction with other tools, like stick or whisker with on of its anti-ids tactics. There are also some additional interesting scan types like -sN or Xmas scan. Regards Aleksander Czarnowski AVET INS ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- DoS tools Mark Villanova (Sep 06)
- Re: DoS tools Matthew Leeds (Sep 06)
- Re: DoS tools Josha Bronson (Sep 10)
- <Possible follow-ups>
- RE: DoS tools Sean Knox (Sep 06)
- RE: DoS tools Ofir Arkin (Sep 07)
- RE: DoS tools shawn merdinger (Sep 07)
- RE: DoS tools Ofir Arkin (Sep 07)
- RE: DoS tools Talha, Sebastien (Sep 07)
- RE: DoS tools Aleksander Czarnowski (Sep 10)