11 Jun
2013
11 Jun
'13
4:10 p.m.
On Tue, 11 Jun 2013 15:38:45 -0400, "David Edelman" said:
I can just see someone spoofing a packet from victimA port 7/UDP to victimB port 19/UDP.
For a while, it was possible to spoof packets to create a TCP connection from a machine's chargen port to its own discard port and walk away while it burned to the ground. Fun times.