The ideal thing would be for you to
research each type of attack and understand how to differentiate between them using your favorite traffic analysis tool. That said, because this program lets you control remote daemons without having been granted permission to do so, this is considered cracking and is not compatible with the
LQ rules. Thread closed.