I was testing some old Denial Of Service tools on Arachne 1.60 beta today,
and to my surprise when i started the first tool, arachne locked up solid!

The exploit i was using is known as the jolt attack.. 

As i don't know what the exploit is actually doing i did some research
with tcpdump and it tells me there are send a lot of udp fragments

At the moment i haven't got the source code of jolt-exploit, only got a
binary for glibc2 at the moment... Mail me if you want it... the source
code should be somewhere on packetstorm
(http://packetstorm.securify.com/). Or on rootshell
(http://www.rootshell.com)

Preferred number of packets is 100 

-- 
 Met vriendelijke groet,
        Cliff Albert <[EMAIL PROTECTED]>

Reply via email to