-
March 26th, 2002, 03:38 PM
#11
all kiddies get curious i think, but to mess with google! thats going to far...
-
March 27th, 2002, 11:56 AM
#12
Junior Member
Although, actually, if any of you knew about these things, you'd know a lot of buffer overflows don't need speed and power, and a fast connection, because it's not a DoS attack. Buffers can sit and wait to be filled up with information, so some BO exploits can be done on a 9,600 modem, if you wish.
What broke in a man when he brought himself to kill another? - Alan Paton.
-
March 27th, 2002, 02:59 PM
#13
Member
Tehehehe steeld is right...
DoS or DDoS partially depends on speed not buffer overflows.
Just 2 very simple examples to ******** things;
1. to cause an overflow;
You push a large data into a stack which cannot handle that much data correctly at a time. Check for the popular ftpds' buffer overflow problems to see that (eg: adding 200 characters to a directory input...)
2. to make a Denial of Services or Distributed Denial of Services;
What the code red's aim was.
First it captured many zombie computers, then it caused them to request a simple page for many times. If 1 computer requests a page every 5 seconds and if this process is done with a million of computers, guess what?
If this kind of attack is made via only one source then that's called DoS and if there are more than 1 source that is called DDoS.
Clear enough?
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|