
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 198
TribeFloodNetwork UDP,ICMP,SYN.Smurf
Stacheldrachtandvariants UDP,ICMP,SYN.Smurf
TFN2K UDP,ICMP,SYN.Smurf
Shaft UDP,ICMP,SYN.combo
Mstream Stream(ACK)
Trinity,TrinityV3 UDP,SYN,RST,RandomFlag,ACK,Fragment,...
Oftheabovetools,TFNanditsvariancesseemtobethemostpopularchoices.An
articleprovidedbytheUniversityofChicagodescribesTFNindetail:
“TribalFloodNetworkissimilartotrin00init'sgeneraldesign,thoughthereisno
Windowsversionofit.…Communicationbetweentheclientsanddaemonsisdone
viaICMPEchoReplies.Thismeansthatthetraff iclooksalmostidenticaltostandard
pings.It'shardtolocatewithout lookingatthecontentsofthepacketandimpossible
toblockatafirewallwithoutblockingoutgoingpings.Thecommandsarehidden
insidetheidfieldoftheICMPpacket…NewerversionsofTFNallowforencryption
ofboththeiplistfile,thelistofmasters,andthedataportionoftheICMPpackets.”
73
So,aslongaswehaveICMPconnectivitywiththeamplifiersandthattheTFN
daemonsarerunningonthem,wecanlaunch an attackeasily!
UsingTFN:
HowtouseTFN?
Firstofall,weneedtounderstandhowTFNworks.AccordingtoDavidDittrich,
“TFNismadeupofclientanddaemonprograms,whichimplementadistributed
networkdenialofservicetoolcapableofwagingICMPflood,SYNflood,UDPflood,
73
http://security.uchicago.edu/seminars/DDoS/tfn.shtml
Comentarios a estos manuales