Teardrop 2 Attack

Discussion in 'Computer Security' started by victima, Mar 31, 2012.

  1. victima

    victima

    Joined:
    Mar 31, 2012
    Messages:
    1
    hi guys, i'm new here, i need your help, i'm doing my thesis about network security and i'm focusing in teardrop2 attacks, until now i've gotten some names as newtear, bonk or boink, but that i need is the source code, .exe, algorithms or any clues, if anybody can help me, please respond, thanks
     
    victima, Mar 31, 2012
    #1
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Tim J. Dunn
    Replies:
    2
    Views:
    900
    reshman
    Nov 5, 2003
  2. SingSong

    DOS Attack

    SingSong, Dec 12, 2003, in forum: Cisco
    Replies:
    3
    Views:
    691
    Bob by The Bay
    Dec 13, 2003
  3. Radley
    Replies:
    0
    Views:
    632
    Radley
    Jan 20, 2004
  4. jason b

    806 attack logging

    jason b, Feb 2, 2004, in forum: Cisco
    Replies:
    0
    Views:
    432
    jason b
    Feb 2, 2004
  5. dorothy.bradbury
    Replies:
    15
    Views:
    1,038
    dorothy.bradbury
    Jul 21, 2003
Loading...

Share This Page