[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f87d771805041811076b64943d@mail.gmail.com>
Date: Mon Apr 18 21:05:46 2005
From: diego.casati at gmail.com (Diego Casati)
Subject: TCP/IP Stack Vulnerability
This are some screenshots that we took during our tests so you guys
can check it out and also an Ethereal log. To replicate the original
test do this:
1) Run storm in a BSD system as root
2) telnet to another machine, it doenst matter the target port
3) Run xload or ethereal, or tcpdump in the Unix Machine or in the MS
one do a ctrl+alt+del and watch the load and performance monitor.
Diego Casati
diego.casati@...il.com
Inatel - Instituto Nacional de Telecomunica??es
Brazil
On 4/18/05, Eduardo Tongson <propolice@...il.com> wrote:
> Compiles and runs ok on *BSD and Linux.
> No effect on windows xp sp2 home/pro, Linux 2.4/2.6, NetBSD 2.0.2, DragonFly 1.2
> No sign of DoS on either side of the connection.
> No wonder people you sent the advisory to didn't bother to respond
>
> --
> Eduardo Tongson
> <pornadmin.net/~tongson>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: storm - telnet
Type: application/octet-stream
Size: 2226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050418/02a8ccdd/storm-telnet-0001.obj
-------------- next part --------------
A non-text attachment was scrubbed...
Name: screenshots.zip
Type: application/zip
Size: 865517 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050418/02a8ccdd/screenshots-0001.zip
Powered by blists - more mailing lists