SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Novell (NOVL) dirt cheap, good buy?

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Paul Fiondella who wrote (30262)2/11/2000 12:30:00 PM
From: Scott C. Lemon  Read Replies (1) of 42771
 
Hello Paul,

> It sounds like the attackers in this denial of service approach had
> to have some way of compromising the servers they used to host the
> attack. Did they simply crack a user ID or did they invade the
> packets that circulate on the net directly?

So the hack that they used is not as important as the concept.

They located servers around the world that they were able to compromise. They either hacked in directly, or they suckered the user into running some application which was a "trojan horse". Through either process they installed a "Zombie" application which ran in the background on the compromised machines, waiting for some instructions on what to do.

The "Zombie" followed these programmed instructions to start sending packets at the "victim" networks ... and with enough of these "Zombies" sending at the same time, they overwhelmed the routers ...

Anyone could fall victim to hosting such a "Zombie" on their workstation by running .EXE applications that are mailed around the net, or by "bad" ActiveX components, or by a variety of other hacks.

(P.S. Years ago I was learning to play with IPX and DOS programming ... I created such a program and architecture which I called my "Tourist" architecture. It included a "port of entry" application which ran as a TSR in DOS and provided the same types of extensible capabilities. A couple of years ago I wrote (with a friend) an updated version that I called the ActiveTourist which used ActiveX as the method to set up a "port of entry" application on Microsoft platforms. I was going to present it at Brainshare, but Novell wasn't interested ... ;-)

Scott C. Lemon
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext