Differences for page SYN floodCurrent version compared with version Tue Nov 23 03:41:49 GMT 2004...
- The SYN flood is an attack that can nowadays be defined as archaic, although the general idea can still work (in a DDoS, for instance).
+ !!The SYN flood is an attack that can nowadays be defined as archaic, although the general idea can still work (in a DDoS, for instance).
+
The goal of this attack is to send TCP connection requests faster than a machine can process them
in order to saturate the resources and prevent the machine from accepting any more connections.
Actually the attacker does not create a whole TCP connection, but just send a SYN packet
...
but still the attack can create some problem. A simpler way to face it, that is somewhat effective and
yet very simple, is to drop a connection at random if there are too many open connections.
- This wiki is nothing without code, so here we go (attached as .htcl file)
+ ----
- # (c) GPL2 fluxist@gmail.com
+
+ This wiki is nothing without code, so here we go (as .htcl file).....
+
+ # (c) GPL2 fluxist(at)gmail.com
# Usage; hping3 exec ./synflood.htcl <hostname> <dstport>
- if {$argc < 1} {
- puts "required arguments; hostname dstport"
+ if {$argc < 2} {
+ puts "Required arguments: hostname dstport"
exit 1
}
...
The following is the old page content
|