Results 1 to 3 of 3
- 11-21-2004, 07:20 AM #1ARTFUL DOGGERGuest
- 11-21-2004, 07:29 AM #2michael turnerGuest
Re: smurfing
On Sun, 21 Nov 2004 09:20:27 -0400, ARTFUL DOGGER wrote:
> how do i hack another cell phone
http://searchsecurity.techtarget.com...213013,00.html
-------------
Smurfing is the attacking of a network by exploiting Internet Protocol
(IP) broadcast addressing and certain other aspects of Internet operation.
Smurfing uses a program called Smurf and similar programs to cause the
attacked part of a network to become inoperable. The exploit of smurfing,
as it has come to be known, takes advantage of certain known
characteristics of the Internet Protocol (IP) and the Internet Control
Message Protocol (ICMP). The ICMP is used by network nodes and their
administrators to exchange information about the state of the network.
ICMP can be used to ping other nodes to see if they are operational. An
operational node returns an echo message in response to a ping message.
--------------
.... I cant see how could you could hack a mobile-phone by smurfing.
--
Michael Turner
Now playing 'Smurfs - Christmas In Smurfland'
Email (ROT13)
[email protected]
- 11-25-2004, 08:59 AM #3ChrisMGuest
Re: smurfing
Maybe... no, bear with me here...
Smurfs were blue... (did they wear little blue coats?)
P'raps he meant Blue Jacking...?
--
Please remove shoes to reply
But what ... is it good for?
- Engineer at the Advanced Computing Systems Division of IBM, 1968,
commenting on the microchip.
"michael turner" <[email protected]> wrote in message
news[email protected]...
> On Sun, 21 Nov 2004 09:20:27 -0400, ARTFUL DOGGER wrote:
>
> > how do i hack another cell phone
>
>
http://searchsecurity.techtarget.com...213013,00.html
> -------------
> Smurfing is the attacking of a network by exploiting Internet Protocol
> (IP) broadcast addressing and certain other aspects of Internet operation.
> Smurfing uses a program called Smurf and similar programs to cause the
> attacked part of a network to become inoperable. The exploit of smurfing,
> as it has come to be known, takes advantage of certain known
> characteristics of the Internet Protocol (IP) and the Internet Control
> Message Protocol (ICMP). The ICMP is used by network nodes and their
> administrators to exchange information about the state of the network.
> ICMP can be used to ping other nodes to see if they are operational. An
> operational node returns an echo message in response to a ping message.
> --------------
>
> ... I cant see how could you could hack a mobile-phone by smurfing.
>
> --
> Michael Turner
> Now playing 'Smurfs - Christmas In Smurfland'
> Email (ROT13)
> [email protected]
Creditare Eficientă
in Chit Chat