[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Trash your Enemy's Server




Mike Duvos wrote:
> 
> 
> Igor writes:
> 
> [C program which allegedly does a DoS attack on a server]
> 
> I thought the correct way to do this was to spew packets with random
> return addresses and fill up the host's listen table with half open TCP
> connections waiting to time out. 

There are patches that protect against this. The DOS attack that you mention
has been beaten to death in BugTraq and other places. It worked great until
all major OSes were patched. (of course some backwards sites still run
unpatched OSes)

It is very hard to protect against my attack, because it can only be done
at the application level. xinetd _may_ be helpful, though, if the service
being attacked is started from [x]inetd.

> Opening 1,000 genuine TCP connections to a host wastes both the host's
> resources as well as yours, and is a tad obvious should your target
> log packets with your IP address in them. 

Yes, BUT most typically a new connection creates only a new file 
descriptor on the host, and a whole new process on the target host.

	- Igor.