Page 2 of 2 FirstFirst 12
Results 11 to 13 of 13

Thread: What does this look like?

  1. #11
    Senior Member
    Join Date
    Jan 2002
    Posts
    218
    all kiddies get curious i think, but to mess with google! thats going to far...

  2. #12
    Junior Member
    Join Date
    Mar 2002
    Posts
    3
    Although, actually, if any of you knew about these things, you'd know a lot of buffer overflows don't need speed and power, and a fast connection, because it's not a DoS attack. Buffers can sit and wait to be filled up with information, so some BO exploits can be done on a 9,600 modem, if you wish.
    What broke in a man when he brought himself to kill another? - Alan Paton.

  3. #13
    Member
    Join Date
    Aug 2001
    Posts
    69

    Wink

    Tehehehe steeld is right...
    DoS or DDoS partially depends on speed not buffer overflows.

    Just 2 very simple examples to ******** things;
    1. to cause an overflow;
    You push a large data into a stack which cannot handle that much data correctly at a time. Check for the popular ftpds' buffer overflow problems to see that (eg: adding 200 characters to a directory input...)

    2. to make a Denial of Services or Distributed Denial of Services;
    What the code red's aim was.
    First it captured many zombie computers, then it caused them to request a simple page for many times. If 1 computer requests a page every 5 seconds and if this process is done with a million of computers, guess what?

    If this kind of attack is made via only one source then that's called DoS and if there are more than 1 source that is called DDoS.

    Clear enough?
    Try, Fail but Do iT at last!
    ASA The ZeroTimeR
    The Turkish IT Documentation Project

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •