Home page logo

basics logo Security Basics mailing list archives

Simulating Attacks
From: Bhargav Bhikkaji <bbhikkaji () yahoo co in>
Date: 4 Mar 2004 15:37:42 -0000

Hello Folks,

I am in need of simulating few attacks as demo to a group of 50. Need your help/suggestion for choosing the following

1) What attacks should i choose ?
2) How to simulate these attacks? 

I am thinking of few attacks like Buffer Overflow, TCP Hijacking but  don't know how much effort is needed to simulate 
these. I am not interested in TCP or ICMP DOS Attacks.


Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]