A lot of ppl ask me for this DoS attack, and that DoS attack, what they do and shit, after a while i get sick of it, so i hope this will shut a few ppl up. I've decided to include a load of DoS gear in Happle and list a discription of each one as follows below. The archive should be included with the magazine as Denial.sit.
arp_fun.txt : Shows how to exploit peeps with ARP
bloop.c : Like Jolt or ssping, supposed to be a stronger attack tho (Against Win 95/98)
boink.c : Runs through open ports against a winblows OS, if it gets one it sends a modified teardrop (kinda reverse of a teardrop)
coke.c : Attack against windowsnt servers 3.51/4.0, lags the system by sedning errors that *may* be picked up by the event log
cvn.c : Modified fork()'er DoS attack
echok.c : ICMP_ECHO attack aginst win 98/95/NT, also works against MacOS ≤ system 8.5
eudora4.html : Just tells you how to send a e-mail to someone who has Eudora Pro 4.0 which crashes it.
Flushot.c : Spoofed DoS attack against win 95/98
fraggle.c : Uses bcasts to smurf an open tcp port ie. 7 (echo) {which will lag the system}
gargamel : compiled smurfer
gayezoons.c : UDP flooder
gewse.c : A gay ident flooder
HeLL : compiled syn flooder
icmpbd-linux.tar.gz : A client that attaches a string to the end of the icmp header, sets the ip src addr to 6.6.6.6 and icmp type to 8. What this does on the system that gets it is excute the string ie. ./client <ip addr of system> rm -rf /
ikill.c : Sends fragemented icmp packets to a host you choose
ipbomb.c : This sends spoofed udp or tcp packets.
ipfrag.c : sends fragmented tcp/ip packet/s that have enough of their header missing so they can pass through many firewalls
jester.tgz : A couple of things with "cloaking" the attack it uses and shows/dissables security protocals.
jh1.3 : Compiled udp flooder i think ;)
jizz.sh : DNS spoofing
jolt.c : Sends multiple over sized fragmented packets to a windows 95 machine which win puts back together lagging the computer, supposdly works against older MacOS
killwin.c : Wow, fear winnuke ;/
kkill.c : Attack that closes identd port
lamar.c : Makes irc clones that connect to an irc server and flood it with /who *
land.c : Attack that locks up, or makes other shit happen that ppl don't like on these OS's; BSDI 2.1 (vanilla), FreeBSD 2.2.2-RELEASE, FreeBSD 2.2.5-RELEASE, FreeBSD 2.2.5-STABLE, FreeBSD 3.0-CURRENT HP-UX 10.20, MacOS 8.0, NetBSD 1.2, NeXTSTEP 3.0, NeXTSTEp 3.1, OpenBSD 2.1, Solaris 2.5.1, SunOS 4.1.4, Windows 95 (vanilla), Windows 95 + Winsock 2 + VIPUPD.EXE, NCD X Terminals, NCDWare v3.2.1. yay.
lin : compiled icmp nuker for irc, little bit like puke ;P
ncftp.txt : Talks about the flaw in the default setting of ncftp server
Net-RawIP-0.06c.tar.gz : Latest, well should be, raw IP packet manipulation gear.
netscape.window.spoof.txt : Shows that Netscape Communicator 3.04,4.06,4.5 Win95 and 4.08 WinNT can be exploited to goto a differnt link than specified via java.
newpep.c : Modified pepsi (udp flooder).
nukarz : Dunno why i put that in there, guess it was in the wrong dir ;)
nuke.c : ICMP nuker
nuke2 : Compiled newer version of nuke
octopus.c : Makes multiple socket connections to a IP and port specified
orgasm.c : Portscans an IP then connects sockets to each open tcp port sedning it data
overdrop.c : Attack against Linux 2.0.33, lags the system
pron.c : Uses wingates to click banners getting you money
puke.c : Dissconnects users from IRC using ICMP unreachable packets, works against win, macOS and unix (sometimes). Fun prog
quake.c : Sends UDP packets to quake servers.
quake2.c : Newer version of the above
quench.c : Nice UDP flooder
rc8.c : Rythem collision UDP flooder
realg2freebsd.txt : Just says that there is an exploit/memory leak in RealServer G2 which causes FreeBSD 3.0-stable to crash/reboot randomly (mostly rebooting).
resetter.c : Attack against winblows, using code from puke and ipl
rfc1644.txt : Attack using the SYN-flood attack with TTCP-packets, sending commands such as rm -rf /
rpk.c : Attack against Real Player 5.0 for Windows95 and Linux, crashes the player lagging the computer (using 100% oof idle CPU)
RST_flip.c : This is a DoS attack that works once connected to the host (Linux, SunOS, FreeBSD)
rwhokill.c : Kills rwho on linux (slackware), FreeBSD 2.2.5-Stable, NetBSD 1.2.
sesquipedalian.c : DoS attack against kernels Linux 2.1.89 - 2.2.3 exploiting length fragmentation.
sf_paus.c : SYN flooder
shits.c : Kills nearly any process on RedHat 5.1
slice : compiled version of slice.c
slice.c : A nice version (modified) of synk4.c
slmail3.1.txt : Talks about the vulnerbilities of SLMail's POP service
smack.c : Sends random ICMP unreachable packets from random ip's
smurf.c : A discription and code of the smurf
smurf.txt : More description of the smurf attack
smurf4.c : A modified smurf.c
sniffitover.c : Crashes sniffit cause of the fact that sniffit segfaults when receiving a packet whith a data offset > 5
solaris_land.c : Land attack ported to Solaris
solaris_ping.txt : Shows how to exploit Solaris 2.5 via pinging
ssynk4 : A compiled syn flooder
storm.c : Flooder of some sort ;)
stuffit.c : Pinging with illegal character, in ther words a 1024 byte ECHO_REQUEST could seem like 2048 bytes
syndrop.c : Teardrop and SYN attack at the same time
synful.c : SYN/ACK and ACK attack
synk4.c : SYN flooder
synsol.c : SYN attack against; Linux 2.0.33, Linux 2.0.30, Linux 1.2.13, Solaris 2.4. Solaris 2.5.1, SunOS 4.1.3_U3
sysfog.c : Just fills disk space
targa.c : Land, jolt, bonk, frag, nesta, winnuke all in one. Coded by Mixter
teardrop.linux : Compiled teardrop
thc.c : Smurfer
udpdata.c : Attack against port 7 (echo), crashing the system
udpdenial.c : Same as above
voodoo.tgz : Mail/flood/bomb prog
winarp.c : Attack against windows 9X/NT using ARP packets
windows98.pingflood.txt : Just showing how lame windows is freezing from normal pings
wingate-killer.pl : Attacks wingates crashing them (PERL)
wingate-killer.sh : Crashes wingates
wingatecrash.c : Yes, it crashes wingates :P
write_flood.pl : Shows how to flood someone who has mesg y set
xtvscreen.suse6.txt : Tells you how to use xtvscreen to overwrite any file on the suse system
A lot of those DoS attacks want raw socket permission, which of course normal users don't have, so to bypass that run it as suid. That's all from me.
Ferrocyanide
"The beatings will continue untill moral improves"