Skip to Content [alt-c]

Andrew Ayer

Sections

ICMP Redirect Attacks in the Wild

Comment by Reader Mike

This comment is owned by whoever posted it. I am not responsible for it in any way.

Hello, Andrew. I came across your website while researching tcp/ip attacks that can route packets to the wrong, or unintended host. I'm familiar with the SYN flood attack, but I'm not really grasping where in the attack the attacker has successfully rerouted packets where the user didn't intend and, furthermore, what this allows the attacker to achieve aside from DOS.

Thanks, Andrew. I look forward to hearing back from you.

Mike

| Posted on 2015-01-31 at 00:48:49 UTC by Reader Mike | Reply to This

Post a Reply

Your comment will be public. If you would like to contact me privately, please email me. Please keep your comment on-topic, polite, and comprehensible. Use the "Preview" button to make sure your comment is properly formatted. Name and email address are optional. If you specify an email address it will be kept confidential.

Post Comment


(Optional; will be published)


(Optional; will not be published)


(Optional; will be published)


  • Blank lines separate paragraphs.
  • Lines starting with ">" are indented as block quotes.
  • Lines starting with two spaces are reproduced verbatim.
  • Text surrounded by *asterisks* is italicized.
  • Text surrounded by `back ticks` is monospaced.
  • URLs are turned into links.