Stacheldraht: Unterschied zwischen den Versionen
K Textersetzung - „== Syntax ==“ durch „== Aufruf ==“ |
|||
(25 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
Zeile 1: | Zeile 1: | ||
''' | '''Stacheldraht''' - Malware für verteilte Denial-of-Service-Angriffe (DDOS) | ||
== Beschreibung == | == Beschreibung == | ||
; Stacheldraht ist eine Malware, die einen verteilten Denial-of-Service-Angriff (DDoS) durchführt | ; Stacheldraht ist eine Malware, die einen verteilten Denial-of-Service-Angriff (DDoS) durchführt | ||
* Sie wurde von "Thomas Stacheldraht" geschrieben, einem Mitglied der österreichischen Hackergruppe TESO | * Sie wurde von "Thomas Stacheldraht" geschrieben, einem Mitglied der österreichischen Hackergruppe TESO | ||
* Sie wurde erstmals 1999 veröffentlicht | * Sie wurde erstmals 1999 veröffentlicht | ||
[[Image:Stachledraht_DDos_Attack.svg|mini|Stacheldraht attack diagram]] | |||
{| class="wikitable options" | |||
! Option !! Beschreibung | |||
|- | |||
| [https://en.wikipedia.org/wiki/Software_release_life_cycle Stable release] | |||
| 4 | |||
|- | |||
|| [https://en.wikipedia.org/wiki/Repository_(version_control) Repository] | |||
|| [https://packetstormsecurity.com/distributed/stachel.tgz https://packetstormsecurity.com/distributed/stachel.tgz] | |||
|- | |||
|| '''Written in''' | |||
|| [https://en.wikipedia.org/wiki/C_(programming_language) C] | |||
|- | |||
|| [https://en.wikipedia.org/wiki/Operating_system Operating system] | |||
|| [https://en.wikipedia.org/wiki/Linux Linux], [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris] | |||
|- | |||
|| [https://en.wikipedia.org/wiki/File_size Size] | |||
|| 36 kB | |||
|- | |||
|| [https://en.wikipedia.org/wiki/Software_categories#Categorization_approaches Type] | |||
|| [https://en.wikipedia.org/wiki/Botnet Botnet] | |||
|- | |||
|| '''Website''' | |||
|| [http://packetstormsecurity.org/distributed/stachel.tgz packetstormsecurity] | |||
|- | |||
|} | |||
Stacheldraht uses a number of different [https://en.wikipedia.org/wiki/Denial-of-service denial-of-service] (DoS) attack methods, including [https://en.wikipedia.org/wiki/Ping_flood Ping flood], [https://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] [https://en.wikipedia.org/wiki/UDP_flood flood], [https://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] [https://en.wikipedia.org/wiki/SYN_flood SYN flood], and [https://en.wikipedia.org/wiki/Smurf_attack Smurf attack]. Further, it can detect and automatically enable [https://en.wikipedia.org/wiki/IP_address_spoofing source address forgery]. Adding encryption, it combines features of [https://en.wikipedia.org/wiki/Trinoo Trinoo] and of [https://en.wikipedia.org/wiki/Tribe_Flood_Network Tribe Flood Network]. The software runs on both [https://en.wikipedia.org/wiki/Linux Linux] and [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris].[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]] | |||
Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.[[https://en.wikipedia.org/wiki/Wikipedia:Citation_needed citation needed]] | |||
== Installation == | == Installation == | ||
== Anwendungen == | == Anwendungen == | ||
=== | === Problembehebung === | ||
== | == Aufruf == | ||
=== Optionen === | === Optionen === | ||
=== Parameter === | === Parameter === | ||
=== | === Umgebung === | ||
=== | === Rückgabewert === | ||
== Konfiguration == | == Konfiguration == | ||
=== Dateien === | === Dateien === | ||
Zeile 25: | Zeile 58: | ||
=== Dokumentation === | === Dokumentation === | ||
==== Man-Page ==== | |||
==== Man- | |||
=== Links === | === Links === | ||
==== Projekt ==== | ==== Projekt ==== | ||
==== Weblinks ==== | ==== Weblinks ==== | ||
Zeile 36: | Zeile 65: | ||
# [https://packetstormsecurity.com/files/10982/stacheldraht.analysis.html Technical analysis of Stacheldraht] | # [https://packetstormsecurity.com/files/10982/stacheldraht.analysis.html Technical analysis of Stacheldraht] | ||
# [http://staff.washington.edu/dittrich/talks/nanog/stacheldraht.html Summary of Stacheldraht features] [https://web.archive.org/web/20160306063131/https://staff.washington.edu/dittrich/talks/nanog/stacheldraht.html Archived] 2016-03-06 at the [https://en.wikipedia.org/wiki/Wayback_Machine Wayback Machine] | # [http://staff.washington.edu/dittrich/talks/nanog/stacheldraht.html Summary of Stacheldraht features] [https://web.archive.org/web/20160306063131/https://staff.washington.edu/dittrich/talks/nanog/stacheldraht.html Archived] 2016-03-06 at the [https://en.wikipedia.org/wiki/Wayback_Machine Wayback Machine] | ||
# ''Cheng, Geoffrey. [https://www.giac.org/paper/gcih/229/analysis-ddos-tool-stacheldraht-v1666/102150 "Malware FAQ: Analysis on DDOS tool Stacheldraht v1.666"]. [https://en.wikipedia.org/wiki/Global_Information_Assurance_Certification GIAC]. SANS Institute. Retrieved 15 May 2021.'' | |||
[[Kategorie:Schadsoftware]] | |||
[[ | |||
Aktuelle Version vom 12. November 2024, 19:40 Uhr
Stacheldraht - Malware für verteilte Denial-of-Service-Angriffe (DDOS)
Beschreibung
- Stacheldraht ist eine Malware, die einen verteilten Denial-of-Service-Angriff (DDoS) durchführt
- Sie wurde von "Thomas Stacheldraht" geschrieben, einem Mitglied der österreichischen Hackergruppe TESO
- Sie wurde erstmals 1999 veröffentlicht
Option | Beschreibung |
---|---|
Stable release | 4 |
Repository | https://packetstormsecurity.com/distributed/stachel.tgz |
Written in | C |
Operating system | Linux, Solaris |
Size | 36 kB |
Type | Botnet |
Website | packetstormsecurity |
Stacheldraht uses a number of different denial-of-service (DoS) attack methods, including Ping flood, UDP flood, TCP SYN flood, and Smurf attack. Further, it can detect and automatically enable source address forgery. Adding encryption, it combines features of Trinoo and of Tribe Flood Network. The software runs on both Linux and Solaris.[1]
Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.[citation needed]
Installation
Anwendungen
Problembehebung
Aufruf
Optionen
Parameter
Umgebung
Rückgabewert
Konfiguration
Dateien
Sicherheit
Siehe auch
- Low Orbit Ion Cannon (LOIC) – a stress test tool that has been used for DDoS attacks
- High Orbit Ion Cannon (HOIC) – the replacement for LOIC used in DDoS attacks
- Fork bomb
- Slowloris (computer security)
- ReDoS
Dokumentation
Man-Page
Links
Projekt
Weblinks
- https://en.wikipedia.org/wiki/Stacheldraht
- Technical analysis of Stacheldraht
- Summary of Stacheldraht features Archived 2016-03-06 at the Wayback Machine
- Cheng, Geoffrey. "Malware FAQ: Analysis on DDOS tool Stacheldraht v1.666". GIAC. SANS Institute. Retrieved 15 May 2021.