I was testing some old Denial Of Service tools on Arachne 1.60 beta today, and to my surprise when i started the first tool, arachne locked up solid! The exploit i was using is known as the jolt attack.. As i don't know what the exploit is actually doing i did some research with tcpdump and it tells me there are send a lot of udp fragments At the moment i haven't got the source code of jolt-exploit, only got a binary for glibc2 at the moment... Mail me if you want it... the source code should be somewhere on packetstorm (http://packetstorm.securify.com/). Or on rootshell (http://www.rootshell.com) Preferred number of packets is 100 -- Met vriendelijke groet, Cliff Albert <[EMAIL PROTECTED]>
