I vaguely remember something about modifying permissions on files in the catalog directory, but I can't remember if that's the correct approach for this question.
Okay, I think I've got this. Based on the details provided, Cindy is using a half-open scan, also known as a SYN scan. She's sending SYN packets to see which hosts respond, and then she's sending RST packets to stop the connection before it's fully established.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Lennie
6 months agoLashanda
6 months agoAlyce
6 months agoBernardo
6 months agoJudy
6 months agoBrandon
6 months agoBarabara
6 months agoMalcolm
6 months agoJaney
6 months agoPamela
7 months agoDortha
7 months agoAdell
7 months ago