all things security
Showing 26 - 50 of 84 RSS Feed

Files

4to6.tar.gz
Posted Dec 3, 2000
Authored by Cyrax | Site pkcrew.org

4to6ddos is a distributed denial of service against ipv6 that works without installing ipv6 support. It shoots ipv6 encapsulated in ipv4 packets directly to the ipv4-to-ipv6 tunnels.

tags | denial of service
MD5 | 347b6d04412d64d23635013879bdae36
siden-0.1.0.tar.gz
Posted Oct 1, 2000
Authored by Lawrence Teo | Site siden.sourceforge.net

SIDEN is a distributed network discovery tool which allows you to simulate coordinated/distributed network probes by a group of attackers against one or many target machines. It uses a client/agent architecture where the agents are installed on multiple hosts. Works well on OpenBSD and FreeBSD.

tags | denial of service
systems | freebsd, openbsd
MD5 | b5f5da44d96230d8bf03326be0662dca
omegav3.tgz
Posted Aug 31, 2000
Authored by Xt

Omega v3 Beta is another new DDoS program.

tags | denial of service
MD5 | 8f2b572c9d780eed4a92ad0bcebd2dfd
plague-beta1.tar.gz
Posted Jul 24, 2000
Authored by Blazinweed

Plague creates an environment that is capable of effectively coordinating a number of compromised hosts in a distributed attack. The nature of this attack ranges from denial of service to a sophisticated scan of the Internet for potential targets for future compromise.

tags | denial of service
MD5 | aad7a846b6020714a688798eecbc95b1
UDPer.asm
Posted Jul 24, 2000
Authored by Frost Byte

UDPer is a logic bomb written in ASM for Windows which floods a victim with packets at a certain date.

tags | denial of service
systems | windows
MD5 | 09825a75cecb5dea72f26eddaa024528
Freak88.zip
Posted May 14, 2000
Authored by Freak88@dalnet | Site freak88.net

Freak88's Distributed Attack Suite is a windows trojan similar to wintrin00. It can connect up to 3 infected machines and start 65000 byte ICMP floods. Auto starts from the registry and copies itself to c:\windows\system.

tags | denial of service, trojan, registry
systems | windows
MD5 | 7dbf5b3a7be12d4ee861d5b33bfe1f2d
mstream.analysis.txt
Posted May 14, 2000
Authored by David Dittrich | Site washington.edu

Analysis of the "mstream" distributed denial of service attack tool, based on the source code of "stream2.c", a classic point-to-point DoS attack tool. mstream is more primitive than any of the other DDoS tools.

tags | denial of service
MD5 | 82dd67ecacb8ff5731279209d4b70342
Turner.mstream
Posted May 2, 2000
Authored by Elliot Turner

In response to the surfacing of the mstream attack tool and the published analysis of its inner workings, a set of SNP-L scripts and attack signatures has been developed which allow one to detect and decode "mstream" network activity.

tags | denial of service
MD5 | 9fe3b07b46660086a0866f329d0fa694
Mstream_Analysis.txt
Posted May 1, 2000
Authored by David Dittrich

Mstream, the newest of DDoS tools to be circulated, has been analyzed and has been found to be more primitive than any of the other DDoS tools available. Examination of reverse engineered and recovered C source code reveals the program to be in early development stages, with numerous bugs and an incomplete feature set compared with any of the other listed tools. The effectiveness of the stream/stream2 attack itself, however, means that it will still be disruptive to the victim (and agent) networks even with an attack network consisting of only a handfull of agents.

tags | denial of service
MD5 | d99d36bb136ad1b329fab03870d478df
mstream.txt
Posted May 1, 2000

mstream, a DDoS tool. It's been alleged that this source code, once compiled, was used by persons unknown in the distributed denial of service (DDoS) attacks earlier this year. Obviously such a thing cannot be confirmed aside from through a process of targeted sites making an appropriate comparison between the traffic this software would generate and the traffic they actually received. Submitted Anonymously.

tags | denial of service
MD5 | 08ec36853347b7b88b5ac0f7f3f15685
mio-star.tgz
Posted Apr 25, 2000
Authored by Drunken Monkey Style

The mio-star distributed multihosted unix password cracker v0.1 runs on all platforms where perl is installed. Comments and documentation is in German.

tags | denial of service, perl
systems | unix
MD5 | 38125314bcf691a20a4acf5974f43e02
ZZ.exe
Posted Mar 30, 2000
Site razor.bindview.com

Zombie Zapper v1.2 Windows NT Binary - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | windows, nt
MD5 | 4d31ad6a76258dbdfb32590f886cbdbd
zombie-1.2.tgz
Posted Mar 30, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper Unix version 1.2 - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | unix
MD5 | 9363ce5dcef7c232049cb3939f7265b3
shaftnode.txt
Posted Mar 30, 2000
Authored by Richard Wash | Site biocserver.cwru.edu

Analysis of a Shaft Node and Master - This analysis is in addition to Sven Dietrich's analysis of the Shaft DDoS tool. The analysis we provide here is a description of the rootkit used and the methods of distribution of the tool.

tags | denial of service
MD5 | 9151ef63ab39cef209bf82545d608b9c
Project_ZombieZapper1.2.zip
Posted Mar 30, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper v1.2 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | windows, nt
MD5 | fb49214cec80694420e8e53705c8ea31
shaft_analysis.txt
Posted Mar 24, 2000
Authored by David Dittrich, Sven Dietrich, Neil Long | Site sled.gsfc.nasa.gov

An analysis of the "Shaft" distributed denial of service tool. Shaftnode was recovered initially in November, 1999. Distinctive features are the ability to switch handler servers and handler ports on the fly, making detection by intrusion detection tools difficult from that perspective, a "ticket" mechanism to link transactions, and the particular interest in packet statistics, showing the "yield" of the DDoS network as a whole.

tags | denial of service
MD5 | e3af444432b23dbc909e55320c0991b2
ddos-thought.txt
Posted Mar 10, 2000
Authored by The Cat

Some thoughts on the solutions to Distributed Attack Technology - Distribited ownership tools [DOT] exist that scan numerous hosts for vunerabilities that allow agents to be installed automatically. Potential solutions include more host based security, fixing ipv4, legislation, and fighting fire with fire.

tags | denial of service
MD5 | 366c7309dbce3df4ecb3b6cb219300a5
TFN2k_Analysis-1.3.txt
Posted Mar 9, 2000
Authored by Jason Barlow | Site www2.axent.com

This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter. Additionally, countermeasures for this attack are also covered.

Changes: This revision includes several new discoveries, corrections, and clarifications. Many thanks to those who responded with feedback and comments to the original posting of this paper.
tags | denial of service, trojan
MD5 | b5d3d9e9a39745decbd6d2d701451e77
zombie-1.1.tar.gz
Posted Feb 29, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper Unix version - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: Supports the new Win trinoo trojan.
tags | denial of service
systems | unix
MD5 | 91bf249439b2af4d04cd3eafc8a082e8
razor.wintrinoo.txt
Posted Feb 29, 2000
Authored by Simple Nomad | Site razor.bindview.com

Razor has acquired a copy of the Windows Trojan Trinoo, the following is technical information gained from disassembling the binary.

tags | denial of service, trojan
systems | windows
MD5 | 2c3b11b28d6e18377678758fca03a8cd
tfn2kpass.c
Posted Feb 25, 2000
Authored by Simple Nomad | Site razor.bindview.com

Tfn2k password recovery tool - Tfn2k asks for a password during the build, which is used to prevent someone from recovering the password from the td or tfn binaries. Usefor for forensics, or to command a whole flood network to send you mail letting you know all the machines infected, or to command an attack to stop if you can recover a binary.

tags | denial of service
MD5 | 85a08d1006bc2666af3ae36a80775b53
ddos-routing.txt
Posted Feb 24, 2000
Authored by Fernando P. Schapachnik

Distributed Deniel Of Service attacks - A proposal based on routing. This paper describes a technique that -hopefully- can be used to defeat the recent DDOS attacks. The solution presented here is bases on routing. It requires a certain amount of extra network infrastructure.

tags | denial of service
MD5 | 9734ca3162ae425dbf0a657ff855d34b
btodd-whitepaper.txt
Posted Feb 22, 2000
Authored by Bennett Todd

Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempts to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. Plain text format, PS and HTML available at the homepage, here.

tags | denial of service
MD5 | aa3bb0212d4996647acb70f05d80b4a2
denial_of_service.htm
Posted Feb 17, 2000
Site cert.org

CERT FAQ on Denial of Service attacks.

tags | denial of service
MD5 | bc8386a01f2b5f7c631434be601f9e35
yahoo.txt
Posted Feb 17, 2000

Technical details of the attack on Yahoo! last week. Includes information on what kind of packets were sent, how they were affected, and how they fixed it.

tags | denial of service
MD5 | 4da5382bb2001defe0ab0207cdf348dd
Page 2 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close