Stacheldraht: Unterschied zwischen den Versionen
Zeile 18: | Zeile 18: | ||
== Siehe auch == | == Siehe auch == | ||
# [https://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon Low Orbit Ion Cannon] (LOIC) – a stress test tool that has been used for DDoS attacks | |||
# [https://en.wikipedia.org/wiki/High_Orbit_Ion_Cannon High Orbit Ion Cannon] (HOIC) – the replacement for LOIC used in DDoS attacks | |||
# [https://en.wikipedia.org/wiki/Fork_bomb Fork bomb] | |||
# [https://en.wikipedia.org/wiki/Slowloris_(computer_security) Slowloris (computer security)] | |||
# [https://en.wikipedia.org/wiki/ReDoS ReDoS] | |||
=== Dokumentation === | === Dokumentation === | ||
==== RFC ==== | ==== RFC ==== |
Version vom 1. März 2023, 01:22 Uhr
topic kurze Beschreibung
Beschreibung
- Stacheldraht ist eine Malware, die einen verteilten Denial-of-Service-Angriff (DDoS) durchführt
- Sie wurde von "Thomas Stacheldraht" geschrieben, einem Mitglied der österreichischen Hackergruppe TESO
- Sie wurde erstmals 1999 veröffentlicht
Installation
Anwendungen
Fehlerbehebung
Syntax
Optionen
Parameter
Umgebungsvariablen
Exit-Status
Konfiguration
Dateien
Sicherheit
Siehe auch
- Low Orbit Ion Cannon (LOIC) – a stress test tool that has been used for DDoS attacks
- High Orbit Ion Cannon (HOIC) – the replacement for LOIC used in DDoS attacks
- Fork bomb
- Slowloris (computer security)
- ReDoS
Dokumentation
RFC
Man-Pages
Info-Pages
Links
Einzelnachweise
Projekt
Weblinks
- https://en.wikipedia.org/wiki/Stacheldraht
- Technical analysis of Stacheldraht
- Summary of Stacheldraht features Archived 2016-03-06 at the Wayback Machine
Testfragen
Testfrage 1
Antwort1
Testfrage 2
Antwort2
Testfrage 3
Antwort3
Testfrage 4
Antwort4
Testfrage 5
Antwort5
Wikipedia
Stacheldraht
Initial release | 1999[1] |
Stable release | 4 |
Repository | https://packetstormsecurity.com/distributed/stachel.tgz |
Written in | C |
Operating system | Linux, Solaris |
Size | 36 kB |
Type | Botnet |
Website | packetstormsecurity |
Stacheldraht uses a number of different denial-of-service (DoS) attack methods, including Ping flood, UDP flood, TCP SYN flood, and Smurf attack. Further, it can detect and automatically enable source address forgery. Adding encryption, it combines features of Trinoo and of Tribe Flood Network. The software runs on both Linux and Solaris.[1]
Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.[citation needed]
References
- Cheng, Geoffrey. "Malware FAQ: Analysis on DDOS tool Stacheldraht v1.666". GIAC. SANS Institute. Retrieved 15 May 2021.