I vaguely remember something about modifying permissions on files in the catalog directory, but I can't remember if that's the correct approach for this question.
Okay, I think I've got this. Based on the details provided, Cindy is using a half-open scan, also known as a SYN scan. She's sending SYN packets to see which hosts respond, and then she's sending RST packets to stop the connection before it's fully established.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Lennie
4 months agoLashanda
4 months agoAlyce
4 months agoBernardo
4 months agoJudy
5 months agoBrandon
5 months agoBarabara
5 months agoMalcolm
5 months agoJaney
5 months agoPamela
5 months agoDortha
5 months agoAdell
5 months ago