No subject

Thu Nov 23 16:36:19 EST 2017

SYN-Flood, and of limited value against buffer overflow attacks; plus, it=20
could be abused by the attacker too.

Since the 'Reset' is sent after the attack packet reaches the host, can=20
it actually prevent the buffer overflow? Now, if the malicious code that=20
gets executed adds a new account (say), wouldn't killing the connection=20
after the event be quite wasted?


Free, encrypted, secure Web-based email at

More information about the Snort-users mailing list