North American Network Operators Group|
Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical
Re: Fwd: stream.c - new FreeBSD exploit?
On Thu, Jan 20, 2000 at 03:01:51PM -0500, Allan Carscaddon wrote: > > Fresh from BUGTRAQ: Oh jesus christ. Enough already. This packet generation code was written by myself approx 5 months ago, for testing purposes. The only difference between it and other SYN flooders is the code is much cleaner and it is unfortunantly puts out an order of magnitude more packets per second then previously existing code (some of which defined "grungy" especially the crap like synk4 slice and other popular packet kiddie programs). A certain individual who shall remain nameless at this time decided to release it to some packet kids 5 months after the fact. There is absolutily nothing new or interesting about the ack flooding, just pure luck and cooincidence that said individual was playing around with the flags out of stupidity and left it as TH_ACK in the ver that got out. The only thing even slightly interesting is that the code does a much better job of being efficient, within the limitation that any high packet per second program entirely in userland using calls to send() will suck no matter what (doesn't rebuild the entire packet every time only the parts that change... common sense?). For everyone that cares the person who originally posted to bugtraq will not be releasing it, and neither will anyone else, so would everyone put their little packet peckers back in their pants and move on. -- Richard A. Steenbergen <[email protected]> http://users.quadrunner.com/humble PGP Key ID: 0x60AB0AD1 (E5 35 10 1D DE 7D 8C A7 09 1C 80 8B AF B9 77 BB) AboveNet Communications - AboveSecure Network Security Engineer, Vienna VA "A mind is like a parachute, it works best when open." -- Unknown