lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 31 Aug 2012 16:31:12 +0300
From: Anestis Bechtsoudis <>
To: Full Disclosure <>
Subject: Re: SNMP Reflected Denial Of Service - PoC

On 8/30/12 8:13 PM, Full Disclosure wrote:
> Hi list,
> I am releasing this code due to the fact that my dev server got hacked and people have been using it in the wild for bad things.
> Network admins should patch their networks appropriately by rejecting snmp connections from unwanted IPs.

The quoted code is actually nothing more than a regular threaded UDP
flood DoS tool, both SNMP spoofed requests and responses are equally 65
bytes (no reflection). Make a simple network capture for verification.

The payload is a mis-used . getBulk SNMP request resulting in a
null value response.

A sample perl script with the biggest reflection factor per transaction
achieved on Cisco devices is available here [1] (Amplification = 84
bytes request / 1480 bytes response).

For more information about SNMP reflection DoS you may refer to this
link [2].

The quoted code reminds me an old implementation on the same concept [3].



| Anestis Bechtsoudis                          |
|                                              |
| Network Operation Center,                    |
| Laboratory for Computing (LabCom),           |
| Dept. of Computer Engineering & Informatics, |
| University of Patras, Greece                 |
| Public Key:             |
| Website:             |

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists