No subject


Thu Nov 23 16:36:19 EST 2017


SYN-Flood, and of limited value against buffer overflow attacks; plus, it=20
could be abused by the attacker too.

Since the 'Reset' is sent after the attack packet reaches the host, can=20
it actually prevent the buffer overflow? Now, if the malicious code that=20
gets executed adds a new account (say), wouldn't killing the connection=20
after the event be quite wasted?

TIA,

Michael
Free, encrypted, secure Web-based email at www.hushmail.com




More information about the Snort-users mailing list