Stacheldraht: Unterschied zwischen den Versionen

Aus Foxwiki
Keine Bearbeitungszusammenfassung
Zeile 8: Zeile 8:
[[Image:Stachledraht_DDos_Attack.svg|mini|Stacheldraht attack diagram]]
[[Image:Stachledraht_DDos_Attack.svg|mini|Stacheldraht attack diagram]]


{| style="border-spacing:0;width:12.98cm;"
{|  
|- style="border:none;padding:0.049cm;"
|-  
| colspan="2" |  
| colspan="2" |  
|- style="border:none;padding:0.049cm;"
|-  
| align=center| '''Initial release'''
|| '''Initial release'''
|| 1999[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
|| 1999[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
|- style="border:none;padding:0.049cm;"
|-  
| align=center| [https://en.wikipedia.org/wiki/Software_release_life_cycle Stable release]
|| [https://en.wikipedia.org/wiki/Software_release_life_cycle Stable release]
|| 4
|| 4
|- style="border:none;padding:0.049cm;"
|-  
| align=center| [https://en.wikipedia.org/wiki/Repository_(version_control) Repository]
|| [https://en.wikipedia.org/wiki/Repository_(version_control) Repository]
|| [https://packetstormsecurity.com/distributed/stachel.tgz https://packetstormsecurity.com/distributed/stachel.tgz]
|| [https://packetstormsecurity.com/distributed/stachel.tgz https://packetstormsecurity.com/distributed/stachel.tgz]
|- style="border:none;padding:0.049cm;"
|-  
| align=center| '''Written in'''
|| '''Written in'''
|| [https://en.wikipedia.org/wiki/C_(programming_language) C]
|| [https://en.wikipedia.org/wiki/C_(programming_language) C]
|- style="border:none;padding:0.049cm;"
|-  
| align=center| [https://en.wikipedia.org/wiki/Operating_system Operating system]
|| [https://en.wikipedia.org/wiki/Operating_system Operating system]
|| [https://en.wikipedia.org/wiki/Linux Linux], [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris]
|| [https://en.wikipedia.org/wiki/Linux Linux], [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris]
|- style="border:none;padding:0.049cm;"
|-  
| align=center| [https://en.wikipedia.org/wiki/File_size Size]
|| [https://en.wikipedia.org/wiki/File_size Size]
|| 36 kB
|| 36 kB
|- style="border:none;padding:0.049cm;"
|-  
| align=center| [https://en.wikipedia.org/wiki/Software_categories#Categorization_approaches Type]
|| [https://en.wikipedia.org/wiki/Software_categories#Categorization_approaches Type]
|| [https://en.wikipedia.org/wiki/Botnet Botnet]
|| [https://en.wikipedia.org/wiki/Botnet Botnet]
|- style="border:none;padding:0.049cm;"
|-  
| align=center| '''Website'''
|| '''Website'''
|| [http://packetstormsecurity.org/distributed/stachel.tgz packetstormsecurity] 
|| [http://packetstormsecurity.org/distributed/stachel.tgz packetstormsecurity] 
|-
|-
|}
|}


Stacheldraht uses a number of different [https://en.wikipedia.org/wiki/Denial-of-service denial-of-service] (DoS) attack methods, including [https://en.wikipedia.org/wiki/Ping_flood Ping flood], [https://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] [https://en.wikipedia.org/wiki/UDP_flood flood], [https://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] [https://en.wikipedia.org/wiki/SYN_flood SYN flood], and [https://en.wikipedia.org/wiki/Smurf_attack Smurf attack]. Further, it can detect and automatically enable [https://en.wikipedia.org/wiki/IP_address_spoofing source address forgery]. Adding encryption, it combines features of [https://en.wikipedia.org/wiki/Trinoo Trinoo] and of [https://en.wikipedia.org/wiki/Tribe_Flood_Network Tribe Flood Network]. The software runs on both [https://en.wikipedia.org/wiki/Linux Linux] and [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris].[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
Stacheldraht uses a number of different [https://en.wikipedia.org/wiki/Denial-of-service denial-of-service] (DoS) attack methods, including [https://en.wikipedia.org/wiki/Ping_flood Ping flood], [https://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] [https://en.wikipedia.org/wiki/UDP_flood flood], [https://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] [https://en.wikipedia.org/wiki/SYN_flood SYN flood], and [https://en.wikipedia.org/wiki/Smurf_attack Smurf attack]. Further, it can detect and automatically enable [https://en.wikipedia.org/wiki/IP_address_spoofing source address forgery]. Adding encryption, it combines features of [https://en.wikipedia.org/wiki/Trinoo Trinoo] and of [https://en.wikipedia.org/wiki/Tribe_Flood_Network Tribe Flood Network]. The software runs on both [https://en.wikipedia.org/wiki/Linux Linux] and [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris].[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]

Version vom 1. März 2023, 01:36 Uhr

Stacheldraht - Malware für verteilte Denial-of-Service-Angriffe (DDOS)

Beschreibung

Stacheldraht ist eine Malware, die einen verteilten Denial-of-Service-Angriff (DDoS) durchführt
  • Sie wurde von "Thomas Stacheldraht" geschrieben, einem Mitglied der österreichischen Hackergruppe TESO
  • Sie wurde erstmals 1999 veröffentlicht
Stacheldraht attack diagram
Initial release 1999[1]
Stable release 4
Repository https://packetstormsecurity.com/distributed/stachel.tgz
Written in C
Operating system Linux, Solaris
Size 36 kB
Type Botnet
Website packetstormsecurity 

Stacheldraht uses a number of different denial-of-service (DoS) attack methods, including Ping flood, UDP flood, TCP SYN flood, and Smurf attack. Further, it can detect and automatically enable source address forgery. Adding encryption, it combines features of Trinoo and of Tribe Flood Network. The software runs on both Linux and Solaris.[1]

Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.[citation needed]

Installation

Anwendungen

Fehlerbehebung

Syntax

Optionen

Parameter

Umgebungsvariablen

Exit-Status

Konfiguration

Dateien

Sicherheit

Siehe auch

  1. Low Orbit Ion Cannon (LOIC) – a stress test tool that has been used for DDoS attacks
  2. High Orbit Ion Cannon (HOIC) – the replacement for LOIC used in DDoS attacks
  3. Fork bomb
  4. Slowloris (computer security)
  5. ReDoS

Dokumentation

RFC

Man-Pages

Info-Pages

Links

Einzelnachweise

Projekt

Weblinks

  1. https://en.wikipedia.org/wiki/Stacheldraht
  2. Technical analysis of Stacheldraht
  3. Summary of Stacheldraht features Archived 2016-03-06 at the Wayback Machine
  4. Cheng, Geoffrey. "Malware FAQ: Analysis on DDOS tool Stacheldraht v1.666". GIAC. SANS Institute. Retrieved 15 May 2021.

Testfragen

Testfrage 1

Antwort1

Testfrage 2

Antwort2

Testfrage 3

Antwort3

Testfrage 4

Antwort4

Testfrage 5

Antwort5