exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from David Dittrich

First Active1999-08-17
Last Active2000-05-14
mstream.analysis.txt
Posted May 14, 2000
Authored by David Dittrich | Site washington.edu

Analysis of the "mstream" distributed denial of service attack tool, based on the source code of "stream2.c", a classic point-to-point DoS attack tool. mstream is more primitive than any of the other DDoS tools.

tags | denial of service
SHA-256 | 243feec66f24ccdbce5b93711153f7ee5460dd38368a1916c04ed718db01e1b5
Mstream_Analysis.txt
Posted May 1, 2000
Authored by David Dittrich

Mstream, the newest of DDoS tools to be circulated, has been analyzed and has been found to be more primitive than any of the other DDoS tools available. Examination of reverse engineered and recovered C source code reveals the program to be in early development stages, with numerous bugs and an incomplete feature set compared with any of the other listed tools. The effectiveness of the stream/stream2 attack itself, however, means that it will still be disruptive to the victim (and agent) networks even with an attack network consisting of only a handfull of agents.

tags | denial of service
SHA-256 | f99e0a8ce4955dd57c4447e0fb53ba79f318ed5fd1ecacfd76efa2782fd75770
shaft_analysis.txt
Posted Mar 24, 2000
Authored by David Dittrich, Sven Dietrich, Neil Long | Site sled.gsfc.nasa.gov

An analysis of the "Shaft" distributed denial of service tool. Shaftnode was recovered initially in November, 1999. Distinctive features are the ability to switch handler servers and handler ports on the fly, making detection by intrusion detection tools difficult from that perspective, a "ticket" mechanism to link transactions, and the particular interest in packet statistics, showing the "yield" of the DDoS network as a whole.

tags | denial of service
SHA-256 | 0af9ed12f935a568a43097d26109b009fa5aa5c7d137a97c98d2ea3460c2395a
sickenscan.tar
Posted Jan 6, 2000
Authored by David Dittrich, Marcus Ranum

"gag" is a program to remotely scan for "stacheldraht" agents, which are part of an active "stacheldraht" network. It will not detect trinoo, the original Tribe Flood Network (TFN), or TFN2K agents. Tested on linux/solaris/AIX/BSD.

tags | denial of service
systems | linux, solaris, bsd, aix
SHA-256 | e5c6d78b9d6ac27ed84bc86b8f0e2a5db68ea378ec8fb8c63b06436eae38fe13
stacheldraht.analysis
Posted Jan 4, 2000
Authored by David Dittrich | Site staff.washington.edu

The following is an analysis of "stacheldraht", a distributed denial of service attack tool, based on source code from the "Tribe Flood Network" distributed denial of service attack tool. Stacheldraht (German for "barbed wire") combines features of the "trinoo" distributed denial of service tool, with those of the original TFN, and adds encryption of communication between the attacker and stacheldraht masters and automated update of the agents.

tags | denial of service
SHA-256 | bc4c022ff592ac5a5e926474eabe73cf1b4c0adf026de3eb391f6a929b9213ec
dsit_workshop.pdf
Posted Dec 9, 1999
Authored by David Dittrich, Clarissa Cook, Richard Kemmerer

Results of the Distributed-Systems Intruder Tools Workshop (Nov 2-4, 1999). Several distributed intruder tools are in widespread use now, and the technology is maturing. As a result, a single command from an attacker can result in tens of thousands of concurrent attacks.

tags | denial of service
SHA-256 | 8b00c34553af24954aaa094e37bc7bc7c6a40a85b44fbaa778b7a8dd07d54f5e
tfn.analysis.txt
Posted Aug 17, 1999
Authored by David Dittrich

The following is an analysis of the "Tribe Flood Network", or "TFN", by Mixter. TFN is ai powerful distributed attack tool and backdoor currently being developed and tested on a large number of compromised Unix systems on the Internet. TFN source available here.

tags | denial of service
systems | unix
SHA-256 | d193538a169810294d7efa1f1fe84ac8f4f4364fdd347856fd7ca36bf6ad472c
trinoo.analysis.txt
Posted Aug 17, 1999
Authored by David Dittrich

The following is an analysis of the DoS Project's "trinoo" (a.k.a. "trin00") master/slave programs, which implement a distributed network denial of service tool. Trinoo daemons were originally found in binary form on a number of Solaris 2.x systems, and probably being set up on hundreds, perhaps thousands, of systems on the Internet that are being compromised by remote buffer overrun exploitation.

tags | remote, denial of service, overflow
systems | solaris
SHA-256 | ade704fd58270cb096e8fa0562d14e34c0c9912b911df5400f01ed222fd8dcf2
dittrich.pl
Posted Aug 17, 1999
Authored by David Dittrich

This program gathers as much information as possible about an intruder's system, using nmap, netcat.

systems | unix
SHA-256 | 7fca0b443490617ba3841442000f3ebafb5f0e00c1a78ac1e854c05579a4ffb8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close