Eicon Networks S92 Instrukcja Użytkownika Strona 198

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 197
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 198
TribeFloodNetwork UDP,ICMP,SYN.Smurf
Stacheldrachtandvariants UDP,ICMP,SYN.Smurf
TFN2K UDP,ICMP,SYN.Smurf
Shaft UDP,ICMP,SYN.combo
Mstream Stream(ACK)
Trinity,TrinityV3 UDP,SYN,RST,RandomFlag,ACK,Fragment,...
Oftheabovetools,TFNanditsvariancesseemtobethemostpopularchoices.An
articleprovidedbytheUniversityofChicagodescribesTFNindetail:
“TribalFloodNetworkissimilartotrin00init'sgeneraldesign,thoughthereisno
Windowsversionofit.…Communicationbetweentheclientsanddaemonsisdone
viaICMPEchoReplies.Thismeansthatthetraff iclooksalmostidenticaltostandard
pings.It'shardtolocatewithout lookingatthecontentsofthepacketandimpossible
toblockatafirewallwithoutblockingoutgoingpings.Thecommandsarehidden
insidetheidfieldoftheICMPpacket…NewerversionsofTFNallowforencryption
ofboththeiplistfile,thelistofmasters,andthedataportionoftheICMPpackets.”
73
So,aslongaswehaveICMPconnectivitywiththeamplifiersandthattheTFN
daemonsarerunningonthem,wecanlaunch an attackeasily!
UsingTFN:
HowtouseTFN?
Firstofall,weneedtounderstandhowTFNworks.AccordingtoDavidDittrich,
“TFNismadeupofclientanddaemonprograms,whichimplementadistributed
networkdenialofservicetoolcapableofwagingICMPflood,SYNflood,UDPflood,
73
http://security.uchicago.edu/seminars/DDoS/tfn.shtml
Przeglądanie stron 197
1 2 ... 193 194 195 196 197 198 199 200 201 202 203 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag