Honeyd prior to 0.8 replies to TCP packets with the SYN and RST flags set, which allows remote malicious users to identify IP addresses that are being simulated by Honeyd.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
niels provos honeyd 0.6 |
||
niels provos honeyd 0.6a |
||
niels provos honeyd 0.7 |
||
niels provos honeyd 0.5 |
||
niels provos honeyd 0.7a |