Newsgroups: comp.security.unix,comp.protocols.tcp-ip

Subject: netkill - generic remote DoS attack
From: stanislav shalunov <[EMAIL PROTECTED]>

Of possible interest for the gentle reader:  I've posted a rather long
message to BUGTRAQ mailing list that concerns a mechanism inherent to
TCP that lets a remote user lock down tens of kilobytes of real
RAM--non-pageable kernel memory--per second (with a demonstration script).

Elias Levy has coined the term "FIN_WAIT flooding" to describe the attack.

The original message can be found at:
http://www.securityfocus.com/templates/archive.pike?list=1&[EMAIL PROTECTED]

------------------------------------------------------
Rohit Sharma [EMAIL PROTECTED]
Public Relations Officer, 
IEEE K.J.Somaiya college of Engineering Student Branch.
Ph: +91.022.5673390

Powered by FreeBSD, Attained Nirvana.


To subscribe / unsubscribe goto the site www.ilug-bom.org ., click on the mailing list 
button and fill the appropriate information 
and submit. For any other queries contact the ML maintener

Reply via email to