Teardrop 2 Attack

Discussion in 'Computer Security' started by victima, Mar 31, 2012.

  1. victima

    victima

    Joined:
    Mar 31, 2012
    Messages:
    1
    Likes Received:
    0
    hi guys, i'm new here, i need your help, i'm doing my thesis about network security and i'm focusing in teardrop2 attacks, until now i've gotten some names as newtear, bonk or boink, but that i need is the source code, .exe, algorithms or any clues, if anybody can help me, please respond, thanks
     
    victima, Mar 31, 2012
    #1
    1. Advertisements

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.
Similar Threads
  1. graeme@invalid

    Tabbrowser Preferences V 2.2.2

    graeme@invalid, Mar 10, 2005, in forum: Firefox
    Replies:
    2
    Views:
    858
    graeme@invalid
    Mar 10, 2005
  2. Tim J. Dunn
    Replies:
    2
    Views:
    1,255
    reshman
    Nov 5, 2003
  3. SingSong

    DOS Attack

    SingSong, Dec 12, 2003, in forum: Cisco
    Replies:
    3
    Views:
    1,107
    Bob by The Bay
    Dec 13, 2003
  4. Vernon
    Replies:
    8
    Views:
    906
    Andy Foster
    May 21, 2004
  5. dacrud@gmail.com

    CiscoWorks 2.2 and 2.5 on Solaris 10

    dacrud@gmail.com, Mar 3, 2006, in forum: Cisco
    Replies:
    4
    Views:
    2,666
    dacrud@gmail.com
    Mar 5, 2006
  6. dorothy.bradbury
    Replies:
    14
    Views:
    1,427
    dorothy.bradbury
    Jul 21, 2003
  7. Adrian
    Replies:
    5
    Views:
    1,076
    Benjamin Gawert
    Mar 19, 2007
  8. ISApose
    Replies:
    10
    Views:
    2,315
Loading...