RE: Pen test of IP stack




Are there any tools which can already test the stack for the
most common vulnerabilities such as the overlapping fragment
attack, teardrop and other?

Yes, you can look at ISIC, it's a great TCP/IP stack fuzzer
http://www.packetfactory.net/Projects/ISIC/ If you are looking for specific
attacks then you will probably need to use something IMPacket (Python) or
nemesis to create those exact scenarios.

JS



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



Relevant Pages

  • Re: Civ 4: Attacking with more then 1 combat unit
    ... there are several of them in the stack. ... >The stack attack is an option in the game. ... The defender always uses the unit with the highest base defensive value ... forces into 2-3 smaller balanced stacks and move into position, ...
    (comp.sys.ibm.pc.games.strategic)
  • Re: Civ 4: Attacking with more then 1 combat unit
    ... The stack attack is an option in the game. ... unit is defending and choosing the appropriate unit from the attacking ... But even with a balanced attacking stack, assaulting a well-defended city ...
    (comp.sys.ibm.pc.games.strategic)
  • Re: The Smoking Gun: Attack On Weiner Was Coordinated With Darrell Issas Office. Hmm.
    ... Attack On Weiner Was Coordinated With Darrell Issa's ... So while Weiner did what he did, looks like the attack on his Twitter ... In a series of e-mails exchanged on May 25, Mike Stack and his Twitter ... Stack, e-mails reveal, was referring to Seamus Kraft, press secretary ...
    (soc.retirement)
  • Re: Civ 4 Stacked Attacks Question
    ... square and then attack all of them at once in a stack. ... But can I accomplish the same thing by just attacking the city one unit ... First reason: collateral damage. ...
    (comp.sys.ibm.pc.games.strategic)
  • Re: Stack growth direction to thwart buffer overflow attacks
    ... > The other day I mused that using an upward growing stack would be ... > remove most of the risk of buffer overflow attack. ... > local variables to breach local security checks. ...
    (comp.security.misc)