Name
|
Description
|
BitchSlap v1.0
|
Implimentation of the Port 139 OOB Attack (WINDOWS)
|
Boink
|
Based on the bonk attack but will attack more ports (UNIX)
|
Bonk
|
Sets the fragment offset greater than the UDP header length, rendering an unpatched kernel useless (UNIX)
|
Click v1.4
|
Utility to disconnect users from irc using Protocol Unreachable Packets (WINDOWS)
|
Jolt v1.0
|
Sends oversized fragmented packets to Win95 boxes causing them to lock up (UNIX)
|
DCC Newk v0.13
|
A direct client to client attack. Implimented against individuals using irc clients that support dcc connections (WINDOWS)
|
Land
|
Spoofs an invalid UDP packet that originates from the same host and same port as the destination, renders an unpatched kernel useless (UNIX)
|
Octopus
|
Opens the maximum number of ports that the host and the target host can support (UNIX)
|
Pnewq
|
Sends multi-requests to a specified port, lagging the target machine (WINDOWS)
|
Pong
|
Attacks an arbitrary host by sending a flood of spoofed ICMP packets (UNIX)
|
Puke
|
Spoofs an ICMP unreachable error to a target, causing connection drops (UNIX)
|
Simping
|
Simulates the "ping -l 65510 victim.host" from Win95 - also compiles on Linux (UNIX)
|
Syn Flooder
|
Sends repeated SYN requests from a spoofed host to which the target host replies SYN-ACK eventually tying up the target host (UNIX)
|
Teardrop
|
Sends invalid and overlapping pairs of UDP packets rendering an unpatched kernel useless (UNIX)
|
Winnuke
|
This sends Out of Band Data to Win95/NT computers causing panics and reboots (UNIX)
|