[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

Dos news



Newsgroups: comp.security.unix,comp.protocols.tcp-ip

Subject: netkill - generic remote DoS attack
From: stanislav shalunov <shalunov@xxxxxxx>

Of possible interest for the gentle reader:  I've posted a rather long
message to BUGTRAQ mailing list that concerns a mechanism inherent to
TCP that lets a remote user lock down tens of kilobytes of real
RAM--non-pageable kernel memory--per second (with a demonstration script).

Elias Levy has coined the term "FIN_WAIT flooding" to describe the attack.

The original message can be found at:
http://www.securityfocus.com/templates/archive.pike?list=1&msg=200004211717.NAA11523@xxxxxxxxxxxxxxxx

------------------------------------------------------
Rohit Sharma rohit@xxxxxxxx
Public Relations Officer, 
IEEE K.J.Somaiya college of Engineering Student Branch.
Ph: +91.022.5673390

Powered by FreeBSD, Attained Nirvana.