exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 84 RSS Feed

Files

4to6.tar.gz
Posted Dec 3, 2000
Authored by Cyrax | Site pkcrew.org

4to6ddos is a distributed denial of service against ipv6 that works without installing ipv6 support. It shoots ipv6 encapsulated in ipv4 packets directly to the ipv4-to-ipv6 tunnels.

tags | denial of service
SHA-256 | c0dbe725adf9a7ce51d22acf6661a36697b83d2a33a2cb06672b6a36c2282ce7
siden-0.1.0.tar.gz
Posted Oct 1, 2000
Authored by Lawrence Teo | Site siden.sourceforge.net

SIDEN is a distributed network discovery tool which allows you to simulate coordinated/distributed network probes by a group of attackers against one or many target machines. It uses a client/agent architecture where the agents are installed on multiple hosts. Works well on OpenBSD and FreeBSD.

tags | denial of service
systems | freebsd, openbsd
SHA-256 | 71edb23b755f7de1eaaf2e5199b905da4676113137ff32ee57c6c86680f60d80
omegav3.tgz
Posted Aug 31, 2000
Authored by Xt

Omega v3 Beta is another new DDoS program.

tags | denial of service
SHA-256 | 44dc22110d1ba998a9af08b7cb232e45dd8cf53b02f90129fc5fd1d3d7c37312
plague-beta1.tar.gz
Posted Jul 24, 2000
Authored by Blazinweed

Plague creates an environment that is capable of effectively coordinating a number of compromised hosts in a distributed attack. The nature of this attack ranges from denial of service to a sophisticated scan of the Internet for potential targets for future compromise.

tags | denial of service
SHA-256 | d0c697c299afbe79b68c6fc88129c5152681cdea9beda495f35458857831f64e
UDPer.asm
Posted Jul 24, 2000
Authored by Frost Byte

UDPer is a logic bomb written in ASM for Windows which floods a victim with packets at a certain date.

tags | denial of service
systems | windows
SHA-256 | 51b9a0b285efad03f7affe599d3191b523a7c8d338e58191576976773663182a
Freak88.zip
Posted May 14, 2000
Authored by Freak88@dalnet | Site freak88.net

Freak88's Distributed Attack Suite is a windows trojan similar to wintrin00. It can connect up to 3 infected machines and start 65000 byte ICMP floods. Auto starts from the registry and copies itself to c:\windows\system.

tags | denial of service, trojan, registry
systems | windows
SHA-256 | 4716af3cf6f3e44d7c95bfa6d56399b7703e912b08884c8eddff832691617583
mstream.analysis.txt
Posted May 14, 2000
Authored by David Dittrich | Site washington.edu

Analysis of the "mstream" distributed denial of service attack tool, based on the source code of "stream2.c", a classic point-to-point DoS attack tool. mstream is more primitive than any of the other DDoS tools.

tags | denial of service
SHA-256 | 243feec66f24ccdbce5b93711153f7ee5460dd38368a1916c04ed718db01e1b5
Turner.mstream
Posted May 2, 2000
Authored by Elliot Turner

In response to the surfacing of the mstream attack tool and the published analysis of its inner workings, a set of SNP-L scripts and attack signatures has been developed which allow one to detect and decode "mstream" network activity.

tags | denial of service
SHA-256 | 7d599172d8cb0bff081b92cc56b96669bc4b1a244c78ad849b823846dd543336
Mstream_Analysis.txt
Posted May 1, 2000
Authored by David Dittrich

Mstream, the newest of DDoS tools to be circulated, has been analyzed and has been found to be more primitive than any of the other DDoS tools available. Examination of reverse engineered and recovered C source code reveals the program to be in early development stages, with numerous bugs and an incomplete feature set compared with any of the other listed tools. The effectiveness of the stream/stream2 attack itself, however, means that it will still be disruptive to the victim (and agent) networks even with an attack network consisting of only a handfull of agents.

tags | denial of service
SHA-256 | f99e0a8ce4955dd57c4447e0fb53ba79f318ed5fd1ecacfd76efa2782fd75770
mstream.txt
Posted May 1, 2000

mstream, a DDoS tool. It's been alleged that this source code, once compiled, was used by persons unknown in the distributed denial of service (DDoS) attacks earlier this year. Obviously such a thing cannot be confirmed aside from through a process of targeted sites making an appropriate comparison between the traffic this software would generate and the traffic they actually received. Submitted Anonymously.

tags | denial of service
SHA-256 | aba6aafe2ecd69a7d502deb4ed65f8fe1aa609356e823945d6cc74e96ec82c2d
mio-star.tgz
Posted Apr 25, 2000
Authored by Drunken Monkey Style

The mio-star distributed multihosted unix password cracker v0.1 runs on all platforms where perl is installed. Comments and documentation is in German.

tags | denial of service, perl
systems | unix
SHA-256 | db9d49784497be47ea822a2ea9409857d496382a544d25862171f4f80ce97cca
ZZ.exe
Posted Mar 30, 2000
Site razor.bindview.com

Zombie Zapper v1.2 Windows NT Binary - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | windows
SHA-256 | dcc715e480b5deefee880cc6be5fe8a4860c6ae9ec35f5da0d4410390f88a0c9
zombie-1.2.tgz
Posted Mar 30, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper Unix version 1.2 - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | unix
SHA-256 | 1b826dedddd3355c5cd7f3c1b0a853a3214af6ea762c4d4ef0be1e09e91a9664
shaftnode.txt
Posted Mar 30, 2000
Authored by Richard Wash | Site biocserver.cwru.edu

Analysis of a Shaft Node and Master - This analysis is in addition to Sven Dietrich's analysis of the Shaft DDoS tool. The analysis we provide here is a description of the rootkit used and the methods of distribution of the tool.

tags | denial of service
SHA-256 | 091e169628a50f06952298b9fe24d4b94d338a3dc8a4cf25c89ff275b310dec7
Project_ZombieZapper1.2.zip
Posted Mar 30, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper v1.2 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | windows
SHA-256 | 284a598ea169fa349dcc72b8a0cd88056fd0e80ff712647d8d5736efa6851fa0
shaft_analysis.txt
Posted Mar 24, 2000
Authored by David Dittrich, Sven Dietrich, Neil Long | Site sled.gsfc.nasa.gov

An analysis of the "Shaft" distributed denial of service tool. Shaftnode was recovered initially in November, 1999. Distinctive features are the ability to switch handler servers and handler ports on the fly, making detection by intrusion detection tools difficult from that perspective, a "ticket" mechanism to link transactions, and the particular interest in packet statistics, showing the "yield" of the DDoS network as a whole.

tags | denial of service
SHA-256 | 0af9ed12f935a568a43097d26109b009fa5aa5c7d137a97c98d2ea3460c2395a
ddos-thought.txt
Posted Mar 10, 2000
Authored by The Cat

Some thoughts on the solutions to Distributed Attack Technology - Distribited ownership tools [DOT] exist that scan numerous hosts for vunerabilities that allow agents to be installed automatically. Potential solutions include more host based security, fixing ipv4, legislation, and fighting fire with fire.

tags | denial of service
SHA-256 | 00d46682b5cc194c176792c769f4a791c3d6ed479ee103cf1df61ea8badc1f6a
TFN2k_Analysis-1.3.txt
Posted Mar 9, 2000
Authored by Jason Barlow | Site www2.axent.com

This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter. Additionally, countermeasures for this attack are also covered.

Changes: This revision includes several new discoveries, corrections, and clarifications. Many thanks to those who responded with feedback and comments to the original posting of this paper.
tags | denial of service, trojan
SHA-256 | 52ca3aa11a97181fd8f458991f35f7642c2e78842154cb4db563dd4b37504103
zombie-1.1.tar.gz
Posted Feb 29, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper Unix version - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: Supports the new Win trinoo trojan.
tags | denial of service
systems | unix
SHA-256 | d2449dc174fe563a2ba61533f5e93fdabc5327ba36f7ee9f40827f10035f866a
razor.wintrinoo.txt
Posted Feb 29, 2000
Authored by Simple Nomad | Site razor.bindview.com

Razor has acquired a copy of the Windows Trojan Trinoo, the following is technical information gained from disassembling the binary.

tags | denial of service, trojan
systems | windows
SHA-256 | 5d0c0846d11849da11543b411218612346e6ce7fccec69dfcc03ec349a9e6dce
tfn2kpass.c
Posted Feb 25, 2000
Authored by Simple Nomad | Site razor.bindview.com

Tfn2k password recovery tool - Tfn2k asks for a password during the build, which is used to prevent someone from recovering the password from the td or tfn binaries. Usefor for forensics, or to command a whole flood network to send you mail letting you know all the machines infected, or to command an attack to stop if you can recover a binary.

tags | denial of service
SHA-256 | cfd719ba0cd05621c443ed48728a727968997b11e93221a512eaa02351d08836
ddos-routing.txt
Posted Feb 24, 2000
Authored by Fernando P. Schapachnik

Distributed Deniel Of Service attacks - A proposal based on routing. This paper describes a technique that -hopefully- can be used to defeat the recent DDOS attacks. The solution presented here is bases on routing. It requires a certain amount of extra network infrastructure.

tags | denial of service
SHA-256 | d4db3368713cb2f7d6a456ebc627dd45e014bc76bf35def353db951d27f392a7
btodd-whitepaper.txt
Posted Feb 22, 2000
Authored by Bennett Todd

Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempts to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. Plain text format, PS and HTML available at the homepage, here.

tags | denial of service
SHA-256 | 88987eea1d392681e2e465811703fdda147cdb9e6f00d84af3abb7ced896526c
denial_of_service.htm
Posted Feb 17, 2000
Site cert.org

CERT FAQ on Denial of Service attacks.

tags | denial of service
SHA-256 | aa308bbdd7a84b75ac107867e1d3be42b7e8b8e32a695161cc3c74c92478cca7
yahoo.txt
Posted Feb 17, 2000

Technical details of the attack on Yahoo! last week. Includes information on what kind of packets were sent, how they were affected, and how they fixed it.

tags | denial of service
SHA-256 | 6ef68ee3bb6800bd3f2021946e09a1eb30e71b8d0e1ee3b57e7c296d180467e2
Page 2 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close