[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

Dos news

Newsgroups: comp.security.unix,comp.protocols.tcp-ip

Subject: netkill - generic remote DoS attack
From: stanislav shalunov <shalunov@xxxxxxx>

Of possible interest for the gentle reader:  I've posted a rather long
message to BUGTRAQ mailing list that concerns a mechanism inherent to
TCP that lets a remote user lock down tens of kilobytes of real
RAM--non-pageable kernel memory--per second (with a demonstration script).

Elias Levy has coined the term "FIN_WAIT flooding" to describe the attack.

The original message can be found at:

Rohit Sharma rohit@xxxxxxxx
Public Relations Officer, 
IEEE K.J.Somaiya college of Engineering Student Branch.
Ph: +91.022.5673390

Powered by FreeBSD, Attained Nirvana.