Introduction

What?

Hacking the heart of the Internet.

Why?

  • Discovering subnets and hosts on a protected network.

  • Generating DoS flood attacks.

  • Alter host routing tables.

How?