. Which of the following is correct as part of DDos-attack (shown in class) ?
a. netsox 76 -i 10.0.2.6 -p 23 -s raw
b. netfox 76 -i 10.0.2.6 -p 23 -s raw
c. netwox 76 -i 10.0.2.6 -p 23 -s raw
d. netvox 76 -i 10.0.2.6 -p 23 -s raw
The correct as is c since netwox 76 tool is used for a SYN flood attack. It is among one of the tools of the netwox(short for networking toolbox). This tool works by sending a flood of TCP SYN packets to a system. For instance to check or test how a firewall responds when it receives rogue TCP SYN packets that have to be ignored.
The -i shows the destination IP address and the -p shows destination port and the -s parameter defines which IP spoof initialization type to use in this case it's the raw type to generate link layer for spoofing.
Comments
Leave a comment