Stacheldraht: Unterschied zwischen den Versionen

Aus Foxwiki
Zeile 2: Zeile 2:
== Stacheldraht ==
== Stacheldraht ==
[[Image:Stachledraht_DDos_Attack.svg|mini|Stacheldraht attack diagram]]
[[Image:Stachledraht_DDos_Attack.svg|mini|Stacheldraht attack diagram]]
Stacheldraht ([https://en.wikipedia.org/wiki/German_language German] for "[https://en.wikipedia.org/wiki/Barbed_wire barbed wire]") is [https://en.wikipedia.org/wiki/Malware malware] which performs a [https://en.wikipedia.org/wiki/Distributed_denial-of-service distributed denial-of-service] (DDoS) attack. It was written by "Thomas Stacheldraht", a member of the Austrian hacker group [https://en.wikipedia.org/wiki/TESO_(Austrian_hacker_group) TESO]. It was first released in 1999.[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
{| style="border-spacing:0;width:12.98cm;"
{| style="border-spacing:0;width:12.98cm;"
|- style="border:none;padding:0.049cm;"
|- style="border:none;padding:0.049cm;"
Zeile 32: Zeile 35:
|}
|}


Stacheldraht ([https://en.wikipedia.org/wiki/German_language German] for "[https://en.wikipedia.org/wiki/Barbed_wire barbed wire]") is [https://en.wikipedia.org/wiki/Malware malware] which performs a [https://en.wikipedia.org/wiki/Distributed_denial-of-service distributed denial-of-service] (DDoS) attack. It was written by "Thomas Stacheldraht", a member of the Austrian hacker group [https://en.wikipedia.org/wiki/TESO_(Austrian_hacker_group) TESO]. It was first released in 1999.[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]


Stacheldraht uses a number of different [https://en.wikipedia.org/wiki/Denial-of-service denial-of-service] (DoS) attack methods, including [https://en.wikipedia.org/wiki/Ping_flood Ping flood], [https://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] [https://en.wikipedia.org/wiki/UDP_flood flood], [https://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] [https://en.wikipedia.org/wiki/SYN_flood SYN flood], and [https://en.wikipedia.org/wiki/Smurf_attack Smurf attack]. Further, it can detect and automatically enable [https://en.wikipedia.org/wiki/IP_address_spoofing source address forgery]. Adding encryption, it combines features of [https://en.wikipedia.org/wiki/Trinoo Trinoo] and of [https://en.wikipedia.org/wiki/Tribe_Flood_Network Tribe Flood Network]. The software runs on both [https://en.wikipedia.org/wiki/Linux Linux] and [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris].[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
Stacheldraht uses a number of different [https://en.wikipedia.org/wiki/Denial-of-service denial-of-service] (DoS) attack methods, including [https://en.wikipedia.org/wiki/Ping_flood Ping flood], [https://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] [https://en.wikipedia.org/wiki/UDP_flood flood], [https://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] [https://en.wikipedia.org/wiki/SYN_flood SYN flood], and [https://en.wikipedia.org/wiki/Smurf_attack Smurf attack]. Further, it can detect and automatically enable [https://en.wikipedia.org/wiki/IP_address_spoofing source address forgery]. Adding encryption, it combines features of [https://en.wikipedia.org/wiki/Trinoo Trinoo] and of [https://en.wikipedia.org/wiki/Tribe_Flood_Network Tribe Flood Network]. The software runs on both [https://en.wikipedia.org/wiki/Linux Linux] and [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris].[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]

Version vom 16. Februar 2023, 13:49 Uhr

Wikipedia

Stacheldraht

Stacheldraht attack diagram

Stacheldraht (German for "barbed wire") is malware which performs a distributed denial-of-service (DDoS) attack. It was written by "Thomas Stacheldraht", a member of the Austrian hacker group TESO. It was first released in 1999.[1]

Initial release 1999[1]
Stable release 4
Repository https://packetstormsecurity.com/distributed/stachel.tgz
Written in C
Operating system Linux, Solaris
Size 36 kB
Type Botnet
Website packetstormsecurity 


Stacheldraht uses a number of different denial-of-service (DoS) attack methods, including Ping flood, UDP flood, TCP SYN flood, and Smurf attack. Further, it can detect and automatically enable source address forgery. Adding encryption, it combines features of Trinoo and of Tribe Flood Network. The software runs on both Linux and Solaris.[1]

Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.[citation needed]

See also


References

  1. Cheng, Geoffrey. "Malware FAQ: Analysis on DDOS tool Stacheldraht v1.666". GIAC. SANS Institute. Retrieved 15 May 2021.


External links

  1. https://en.wikipedia.org/wiki/Stacheldraht
  2. Technical analysis of Stacheldraht
  3. Summary of Stacheldraht features Archived 2016-03-06 at the Wayback Machine