Home

zhangyiqun

Thoughts, stories and ideas.

2014年以前 About Feed

14 Nov 2009
小试tfn2k

工具下载

http://cid-48e23e4eb6cd2943.skydrive.live.com/self.aspx/xxx/tfn2k.tar.gz

我在32位系统中测试时表现良好,在64位中虽然编译通过但是无法调用client ,具体原因我也搞不明白,不知道有没有人研究过。

控制攻击

<-c command ID>    0 – Halt all current floods on server(s) immediately

1 – Change IP antispoof-level (evade rfc2267 filtering)

usage: -i 0 (fully spoofed) to -i 3 (/24 host bytes spoofed)

2 – Change Packet size, usage: -i

3 – Bind root shell to a port, usage: -i

4 – UDP flood, usage: -i victim@victim2@victim3@…

5 – TCP/SYN flood, usage: -i victim@… [-p destination port]

6 – ICMP/PING flood, usage: -i victim@…

7 – ICMP/SMURF flood, usage: -i victim@broadcast@broadcast2@…

8 – MIX flood (UDP/TCP/ICMP interchanged), usage: -i victim@…

9 – TARGA3 flood (IP stack penetration), usage: -i victim@…

10 – Blindly execute remote shell command, usage -i command

网上的几篇同类文章

http://publish.it168.com/2007/0703/20070703119401.shtml

http://www.webjx.com/htmldata/2007-10-08/1191832082.html

http://hi.baidu.com/msrighthomepage/blog/item/1623032d22476ee58b1399f0.html


zhangyiqun

scribble

2014年以前 About Feed