Thu Nov 23 16:36:19 EST 2017
SYN-Flood, and of limited value against buffer overflow attacks; plus, it=20
could be abused by the attacker too.
Since the 'Reset' is sent after the attack packet reaches the host, can=20
it actually prevent the buffer overflow? Now, if the malicious code that=20
gets executed adds a new account (say), wouldn't killing the connection=20
after the event be quite wasted?
Free, encrypted, secure Web-based email at www.hushmail.com
More information about the Snort-users