SYN floods (was: does history repeat itself?)

Dima Volodin dvv at sprint.net
Mon Sep 9 17:44:52 UTC 1996


It just demonstrates the decline of the US education system one more
time - one doesn't need _any_ programming (apart from a rudimentary
ability to write shell while loops) to do SYN flooding attacks.


Dima

Craig A. Huegen writes:
> 
> A friend of mine gave me a photocopy of a page in the latest 2600
> magazine.  It was the source code for a SYN flooder on Linux, with a
> description of what it does and a notice on how it can really cause
> denial-of-service attacks.
> 
> I can't remember if it also supplied the source for the source-spoof
> kernel patch or not, but it does mention that you should use the
> source-spoof patch to hide your identity.
> 
> So, what does this say?  Look for more 13-year-olds causing
> denial-of-service attacks for the hell of it.  It seems a lot of the
> providers SYN flooders like to attack are the ones which have IRC servers,
> but the flooders attack the more traditional services of those providers,
> too.
> 
> /cah
> 
> ----
> Craig A. Huegen  CCIE                             ||        ||
> Network Analyst, IS-Network/Telecom               ||        ||
> cisco Systems, Inc., 250 West Tasman Drive       ||||      ||||
> San Jose, CA  95134, (408) 526-8104          ..:||||||:..:||||||:..
> email: chuegen at cisco.com                    c i s c o  S y s t e m s
> 
> 
> 






More information about the NANOG mailing list