Table of contentsStep 1: install and run software 1(a): Download packet spoofing software Step 2: Observe spoofed packets and responses Step 3: Enable unicast reverse-path filtering (URPF) |
Author: AfNOG E2 2006 Homepage: http://www.ws.afnog.org/ |