- Source: Stacheldraht
Stacheldraht (German for "barbed wire") is malware which performs a distributed denial-of-service (DDoS) attack. It was written by "Thomas Stacheldraht", a member of the Austrian hacker group TESO. It was first released in 1999.
Stacheldraht uses a number of different denial-of-service (DoS) attack methods, including Ping flood, UDP flood, TCP SYN flood, and Smurf attack. Further, it can detect and automatically enable source address forgery. Adding encryption, it combines features of Trinoo and of Tribe Flood Network. The software runs on both Linux and Solaris.
Stacheldraht was later superseded by Blitzkrieg, which was maintained by "random" and a loose group of associates.
See also
Low Orbit Ion Cannon (LOIC) – a stress test tool that has been used for DDoS attacks
High Orbit Ion Cannon (HOIC) – the replacement for LOIC used in DDoS attacks
Fork bomb
Slowloris (computer security)
ReDoS
References
External links
Technical analysis of Stacheldraht
Summary of Stacheldraht features Archived 2016-03-06 at the Wayback Machine
Kata Kunci Pencarian:
- Serangan kegagalan layanan
- R-1 (peluru kendali)
- Rüdiger Overmans
- Botnet
- Stacheldraht
- German prisoners of war in the Soviet Union
- Trinoo
- Denial-of-service attack
- Sachsenhausen concentration camp
- Kapustin Yar
- Slowloris (cyber attack)
- Western Allied invasion of Germany
- R-1 (missile)
- German casualties in World War II