|
|
Zeile 63: |
Zeile 63: |
|
| |
|
| = Wikipedia = | | = Wikipedia = |
| == Stacheldraht ==
| |
| [[Image:Stachledraht_DDos_Attack.svg|mini|Stacheldraht attack diagram]]
| |
|
| |
| {| style="border-spacing:0;width:12.98cm;"
| |
| |- style="border:none;padding:0.049cm;"
| |
| | colspan="2" |
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| '''Initial release'''
| |
| || 1999[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| [https://en.wikipedia.org/wiki/Software_release_life_cycle Stable release]
| |
| || 4
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| [https://en.wikipedia.org/wiki/Repository_(version_control) Repository]
| |
| || [https://packetstormsecurity.com/distributed/stachel.tgz https://packetstormsecurity.com/distributed/stachel.tgz]
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| '''Written in'''
| |
| || [https://en.wikipedia.org/wiki/C_(programming_language) C]
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| [https://en.wikipedia.org/wiki/Operating_system Operating system]
| |
| || [https://en.wikipedia.org/wiki/Linux Linux], [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris]
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| [https://en.wikipedia.org/wiki/File_size Size]
| |
| || 36 kB
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| [https://en.wikipedia.org/wiki/Software_categories#Categorization_approaches Type]
| |
| || [https://en.wikipedia.org/wiki/Botnet Botnet]
| |
| |- style="border:none;padding:0.049cm;"
| |
| | align=center| '''Website'''
| |
| || [http://packetstormsecurity.org/distributed/stachel.tgz packetstormsecurity]
| |
| |-
| |
| |}
| |
|
| |
|
| |
| Stacheldraht uses a number of different [https://en.wikipedia.org/wiki/Denial-of-service denial-of-service] (DoS) attack methods, including [https://en.wikipedia.org/wiki/Ping_flood Ping flood], [https://en.wikipedia.org/wiki/User_Datagram_Protocol UDP] [https://en.wikipedia.org/wiki/UDP_flood flood], [https://en.wikipedia.org/wiki/Transmission_Control_Protocol TCP] [https://en.wikipedia.org/wiki/SYN_flood SYN flood], and [https://en.wikipedia.org/wiki/Smurf_attack Smurf attack]. Further, it can detect and automatically enable [https://en.wikipedia.org/wiki/IP_address_spoofing source address forgery]. Adding encryption, it combines features of [https://en.wikipedia.org/wiki/Trinoo Trinoo] and of [https://en.wikipedia.org/wiki/Tribe_Flood_Network Tribe Flood Network]. The software runs on both [https://en.wikipedia.org/wiki/Linux Linux] and [https://en.wikipedia.org/wiki/Solaris_(operating_system) Solaris].[https://en.wikipedia.org/wiki/Stacheldraht#cite_note-cheng-1 [1]]
| |
|
| |
| Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.[[https://en.wikipedia.org/wiki/Wikipedia:Citation_needed citation needed]]
| |