Stacheldraht

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Stacheldraht
Stachledraht DDos Attack.svg
Stacheldraht attack diagram
Original author(s)"random"
Initial release1999 (1999)[1]
Stable release
4
Written inC
Operating systemLinux, Solaris
Size36 kB
TypeBotnet
Websitehttp://packetstormsecurity.org/distributed/stachel.tgz

Stacheldraht (German for "barbed wire") is malware which performs a distributed denial-of-service (DDoS) attack. It runs on Linux and Solaris. It detects and automatically enables source address forgery. It was written by "random", of the Austrian hacker group TESO.

Stacheldraht uses a number of different denial-of-service (DoS) attacks, including ICMP flood, UDP flood, TCP SYN flood, and Smurf attack.

It combines features of Trinoo and of Tribe Flood Network, and adds encryption.

Stacheldraht was later superseded by Blitzkrieg. Blitzkrieg was maintained by "random" and by a loose group of associates.

See also[edit]

References[edit]

  1. ^ Cheng, Geoffrey. "Malware FAQ: Analysis on DDOS tool Stacheldraht v1.666". SANS. SANS Institute. Retrieved 15 May 2021.

External links[edit]