Penetration Testing mailing list archives

RE: DoS tools


From: Aleksander Czarnowski <alekc () avet com pl>
Date: Mon, 10 Sep 2001 15:11:59 +0200

In some cases we are using nmap with settings like this:
-sS -sR -P0 -T Insane -p1-65535 -f 
and running its instances many times. It will not only return some
information on open ports, but will also allow to test any filtering rules
and reliability of tested host.  It works fine as long as you have the at
least same bandwidth as checked host. Running to many instances on attacking
host can also help you DoS it and check how much load it can hold ;-) Such
setup also allows testing NIDS systems especially when nmap decoy option is
being used. It can also be used in conjunction with other tools, like stick
or whisker with on of its anti-ids tactics. There are also some additional
interesting scan types like -sN or Xmas scan.
Regards
Aleksander Czarnowski
AVET INS

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: