Twenty Year Anniversary
Showing 1 - 1 of 1 RSS Feed

Files

tfn2k.tgz
Posted Dec 20, 1999
Authored by Mixter | Site 1337.tsx.org

Tribe Flood Network 2000. Using distributed client/server functionality, stealth and encryption techniques and a variety of functions, TFN can be used to control any number of remote machines to generate on-demand, anonymous Denial Of Service attacks and remote shell access. The new and improved features in this version include Remote one-way command execution for distributed execution control, Mix attack aimed at weak routers, Targa3 attack aimed at systems with IP stack vulnerabilities, Compatibility to many UNIX systems and Windows NT, spoofed source addresses, strong CAST encryption of all client/server traffic, one-way communication protocol, messaging via random IP protocol, decoy packets, and extensive documentation. Currently no IDS software will recognise tfn2k.

tags | remote, denial of service, shell, spoof, vulnerability, protocol
systems | windows, unix, nt
MD5 | fc1cb14f2e24cdc2b64f93dde22f8420
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Californian Man Gets Six Months For Assisting Russian Trolls
Posted Oct 12, 2018

tags | headline, government, usa, russia, fraud, cyberwar
A Mysterious Grey Hat Is Patching People's Outdated MikroTik Routers
Posted Oct 12, 2018

tags | headline, hacker, flaw, patch
Facebook Shuts Down Spammy Politics Pages
Posted Oct 12, 2018

tags | headline, government, fraud, cyberwar, facebook, social
Fake Adobe Flash Updates Hide Malicious Crypto Miners
Posted Oct 12, 2018

tags | headline, malware, flaw, adobe, cryptography
Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
Posted Oct 11, 2018

tags | headline, phone, cybercrime, fraud, cryptography
Hackers Breach Web Hosting Provider For The Second Time In The Past Year
Posted Oct 11, 2018

tags | headline, hacker, privacy, data loss
US Weapons Systems Can Be Easily Hacked
Posted Oct 11, 2018

tags | headline, hacker, government, usa, flaw, cyberwar, military
Network Time Protocol Bugs Sting Juniper Operating System
Posted Oct 11, 2018

tags | headline, flaw, juniper
Four Critical Flaws Patched In Adobe Digital Edition
Posted Oct 11, 2018

tags | headline, malware, flaw, adobe, patch
GAO Report Slams DoD Cyber Security Practices
Posted Oct 11, 2018

tags | headline, government, usa, cyberwar
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close