1997-06-07 - Re: Trash your Enemy’s Server

Header Data

From: mpd@netcom.com (Mike Duvos)
To: cypherpunks@cyberpass.net
Message Hash: e2bd1f8f5ecf3ec810a8eb7c21160ac612ea9084dc5feaec1b3ea6046ff79317
Message ID: <199706062352.QAA18259@netcom3.netcom.com>
Reply To: <199706062334.SAA25668@manifold.algebra.com>
UTC Datetime: 1997-06-07 00:28:12 UTC
Raw Date: Sat, 7 Jun 1997 08:28:12 +0800

Raw message

From: mpd@netcom.com (Mike Duvos)
Date: Sat, 7 Jun 1997 08:28:12 +0800
To: cypherpunks@cyberpass.net
Subject: Re: Trash your Enemy's Server
In-Reply-To: <199706062334.SAA25668@manifold.algebra.com>
Message-ID: <199706062352.QAA18259@netcom3.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain



Igor writes:

[C program which allegedly does a DoS attack on a server]

I thought the correct way to do this was to spew packets with random
return addresses and fill up the host's listen table with half open TCP
connections waiting to time out. 

Opening 1,000 genuine TCP connections to a host wastes both the host's
resources as well as yours, and is a tad obvious should your target
log packets with your IP address in them. 

--
     Mike Duvos         $    PGP 2.6 Public Key available     $
     mpd@netcom.com     $    via Finger.                      $






Thread