Skip to content

Latest commit

 

History

History
2 lines (2 loc) · 242 Bytes

File metadata and controls

2 lines (2 loc) · 242 Bytes

todo

Attacker spoofs a packet to a third party with the victim's source ip. The victim then receives RST's or SYNACK's from valid IPs which make them hard to block. A syn cookie system will protect against it but requires a big state table.