Dos Attack

Dos Attack

A- INTRODUCTION
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A-1. WHAT IS A DENIAL OF SERVICE ATTACK
---------------------------------------------------------
Denial of service is about without permission knocking off services, for example through crashing the whole system. This kind of attacks are easy to launch and it is hard to protect a system against them. The basic problem is that Unix assumes that users on the system or on other systems will be well behaved
A-2. WHY WOULD SOMEONE CRASH A SYSTEM
-----------------------------------------------------------
A-2.1. INTRODUCTION
----------------------------
Why would someone crash a system? I can think of several reasons that I have personated more precisely in a section for each reason, but for short

Sub-cultural status
To gain access
Revenge
Political reasons
Economical reasons
Nastiness

I think that number one and six are the more common today, but that number four and five will be the more common ones in the future

A-2-2- SUB-CULTURAL STATUS
---------------------------
After all information about syn flooding a bunch of such attacks were launched around Sweden. The very most of these attacks were not a part of a IP-spoof attack, it was "only" a denial of service attack. Why? I think that hackers attack systems as a sub-cultural pseudo career and I think that many denial of service attacks, and here in the example syn flooding, were performed for these reasons. I also think that many hackers begin their carrer with denial of service attacks

A-2-3- TO GAIN ACCESS
------------------------------
Sometimes could a denial of service attack be a part of an attack to gain access at a system. At the moment I can think of these reasons and specific holes Some older X-lock versions could be crashed with a method from the denial of service family leaving the system open. Physical access was needed to use the workspace after Syn flooding could be a part of a IP-spoof attack method
Some program systems could have holes under the startup, that could be used to gain root, for ( example SSH secure shell )
Under an attack it could be usable to crash other machines in the network or to deny certain persons the ability to access the system Also could a system being booted sometimes be subverted, especially rarp-boots. If we know which port the machine listen to (69 could be a good guess) under the boot we can send false packets to it and almost totally control the boot

A-2-4- REVENGE
-------------------
A denial of service attack could be a part of a revenge against a user or an administrator

A-2-5. POLITICAL REASONS
-----------------------------------
Sooner or later will new or old organizations understand the potential of destroying computer systems and find tools to do it. For example imaginative the Bank A loaning company B money to build a factory threading the environment. The organization C therefore crash A:s computer system, maybe with help from an employee. The attack could cost A a great deal of money if the timing is right

A-2-6. ECONOMICAL REASONS
---------------------------------------
Imaginative the small company A moving into a business totally dominated by company B. A and B customers make the orders by computers and depends heavily on that the order is done in a specific time (A and B could be stock trading companies). If A and B can't perform the order the customers lose money and change company. As a part of a business strategy A pays a computer expert a sum of money to get him to crash B:s computer systems a number of times. A year later A is the dominating company

A-2-7. NASTINESS
----------------------
I know a person that found a workstation where the user had forgotten to logout. He sat down and wrote a program that made a kill -9 -1 at a random time at least 30 minutes after the login time and placed a call to the program from the profile file. That is nastiness
A-3. ARE SOME OPERATING SYSTEMS MORE SECURE
----------------------------------------------------------
This is a hard question to answer and I don't think that it will give anything to compare different Unix platforms. You can't say that one Unix is more secure against denial of service; it is all up to the administrator. A comparison between Windows 95 and NT on one side and Unix on the other could however be interesting. Unix systems are much more complex and have hundreds of built in programs, services... This always opens up many ways to crash the system from the inside. In the normal Windows NT and 95 networks is few ways to crash the system. Although were methods that always will work. That gives us that no big different between Microsoft and Unix can be seen regarding the inside attacks. But there is a couple of points left

- Unix has much more tools and programs to discover an attack and monitoring the users. To watch what another user is up to under windows is very hard.- The average Unix administrator probably also have much more experience than the average Microsoft administrator The two last p ints gives that Unix is more secure against inside denial of service attacks. A comparison between Microsoft and Unix regarding outside attacks are much more difficult. However I would like to say that the average Microsoft systems on the Internet are more secure against outside attacks, because they normally have much less services

B- SOME BASIC TARGETS FOR AN ATTACK
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

B-1. SWAP SPACE
----------------------
Most systems have several hundred Mbytes of swap space to service client requests. The swap space is typical used for forked child processes, which have a short lifetime. The swap space will therefore almost never in a normal cause be used heavily. A denial of service could be based on a method that tries to fill up the swap space

B-2. BANDWIDTH
-----------------------
If the bandwidth is to high the network will be useless. Most denial of service attack influences the bandwidth in some way

B-3. KERNEL TABLES
---------------------------
It is trivial to overflow the kernel tables, which will cause serious problems on the system. Systems with write through caches and small write buffers are especially sensitive. Kernel memory allocation is also a target that is sensitive. The kernel have a kernel map limit, if the system reach this limit it can not allocate more kernel memory and must be rebooted. The kernel memory is not only used for RAM, CPU:s, screens and so on, it it also used for ordinaries processes. Meaning that any system can be crashed and with a mean (or in some sense good) algorithm pretty fast. For Solaris 2.X it is measured and reported with the SAR command how much kernel memory the system is using, but for SunOS 4.X there is no such command. Meaning that under SunOS 4.X you don't even can get a warning. If you do use Solaris you should write SAR -k 1 to get the information. Netstat -k can also be used and shows how much memory the kernel has allocated in the sub paging

B-4. RAM
----------------
A denial of service attack that allocates a large amount of RAM can make a great deal of problems. NFS and mail servers are actually extremely sensitive because they do not need much RAM and therefore often don't have much RAM. An attack at a NFS server is trivial. The normal NFS client will do a great deal of caching, but a NFS client can be anything including the program you wrote yourself

B.5. DISKS
-----------
A classic attack is to fill up the hard disk, but an attack at the disks can be so much more. For example can an overloaded disk be misused in many ways

B-6. CACHES
-------------------
A denial of service attack involving caches can be based on a method to block the cache or to avoid the cache. These caches are found on Solaris 2.X: Directory name lookup cache: Associates the name of a file with a vnode. Inode cache: Cache information read from disk in case it is needed again. Node cache: Holds information about the NFS files system. Buffer cache: Cache anode indirect blocks and cylinders to reeled disk I/O

B-7. INETD
----------------
Well once intend crashed all other services running through intend no longer will work

C- ATTACKING FROM THE OUTSIDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
C.1. TAKING ADVANTAGE OF FINGER
------------------------------------------------
Most fingered installations support redirections to an other host
Ex: $finger @system.two.com@system.one.com
finger will in the example go through system.one.com and on to system.two.com. As far as system.two.com knows it is system.one.com who is fingering. So this method can be used for hiding, but also for a very dirty denial of service attack. Lock at this

$ finger @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@host.we.attack

All those @ signs will get finger to finger host.we.attack again and again and again... The effect on host.we.attack is powerful and the result is high bandwidth, short free memory and a hard disk with less free space, due to all child processes (compare with .D.5.). The solution is to install a fingerd, which don't support redirections, for example GNU finger. You could also turn the finger service off, but I think that is just a bit too much

C-2. UDP AND SUNOS 4.1
----------------------------------
SunOS 4.1.3. is known to boot if a packet with incorrect information in the header is sent to it. This is the cause if the ip_options indicate a wrong size of the packet. The solution is to install the proper patch

C-3. FREEZING UP X-WINDOWS
----------------------------------------
If a host accepts a telnet session to the X-Windows port (generally somewhere between 6000 and 6025. In most cases 6000) could that be used to freeze up the X-Windows system. This can be made with multiple telnet connections to the port or with a program, which sends multiple XOpenDisplay () to the port. The same thing can happen to Motif or Open Windows. The solution is to deny connections to the X-Windows port

C.4. MALICIOUS USE OF UDP SERVICES
---------------------------------------------------
It is simple to get UDP services (echo, time, daytime, chargen) to loop, due to trivial IP-spoofing. The effect can be high bandwidth that causes the network to become useless. In the example the header claim that the packet came from 127.0.0.1 (loopback) and the target is the echo port at system.we.attack. As far as system.we.attack knows is 127.0.0.1 system.we.attack and the loop has been establish

Ex
from-IP=127.0.0.1
to-IP=system.we.attack
Packet type: UDP
from UDP port 7
to UDP port 7

Note that the name system.we.attack looks like a DNS-name, but the target should always be represented by the IP-number. Quoted from proberts@clark.net (Paul D. Robertson) comment on comp.security.firewalls on matter of "Introduction to denial of service " A great deal of systems don't put loop back on the wire, and simply emulate it. Therefore, this attack will only affect that machine in some cases. It's much better to use the address of a different machine on the same network. Again, the default services should be disabled in inetd.conf. Other than some hacks for mainframe IP stacks that don't support ICMP, the echo service isn't used by many legitimate programs, and TCP echo should be used instead of UDP where it is necessary

C-5. ATTACKING WITH LYNX CLIENTS
---------------------------------
A World Wide Web server will fork an httpd process as a respond to a request from a client, typical Netscape or Mosaic. The process lasts for less than one second and the load will therefore never show up if someone uses ps. In most causes it is therefore very safe to launch a denial of service attack that makes use of multiple W3 clients, typical lynx clients. But note that the netstat command could be used to detect the attack (thanks to Paul D. Robertson). Some httpd: (for example http-gw) will have problems besides the normal high bandwidth, low memory... And the attack can in those causes get the server to loop compare with .C.6

C-6. MALICIOUS USE OF telnet
----------------------------------------
Study this little script

Ex
while: ; do
telnet system.we.attack & done
An attack using this script might eat some bandwidth, but it is nothing compared to the finger method or most other methods. Well the point is that some pretty common firewalls and httpd:s thinks that the attack is a loop and turn them self down, until the administrator sends kill -HUP. This is a simple high-risk vulnerability that should be checked and if present fixed

C-7. MALICIOUS USE OF telnet UNDER SOLARIS 2.4
---------------------------------------------------------------
If the attacker makes a telnet connections to the Solaris 2.4 host and quits using
Ex
Control-}
quit
then will inetd keep going "forever". Well a couple of hundred
The solution is to install the proper patch

C-8. HOW TO DISABLE ACCOUNTS
-----------------------------
Some systems disable an account after N number of bad logins, or waits N seconds. You can use this feature to lock out specific users from the system

C-9. LINUX AND TCP TIME, DAYTIME
-----------------------------------------------
Inetd under Linux is known to crash if to many SYN packets sends to daytime (port 13) and/or time (port 37). The solution is to install the proper patch

C-10. HOW TO DISABLE SERVICES
--------------------------------------------
Most Unix systems disable a service after N sessions have been open in a given time. Well most systems have a reasonable default (lets say 800 - 1000), but not some SunOS systems that have the default set to 48...The solutions is to set the number to something reasonable

C-11. PARAGON OS BETA R1.4
--------------------------------------
If someone redirects an ICMP (Internet Control Message Protocol) packet to a paragon OS beta R1.4 will the machine freeze up and must be rebooted. An ICMP redirect tells the system to override routing tables. Routers use this to tell the host that it is sending to the wrong router. The solution is to install the proper patch

C-12. NOVELLS NETWARE FTP
---------------------------------------
Novells Netware FTP server is known to get short of memory if multiple ftp sessions connects to it

C-13. ICMP REDIRECT ATTACKS
----------------------------------------
Gateways uses ICMP redirect to tell the system to override routing tables, that is telling the system to take a better way. To be able to misuse ICMP redirection we must know an existing connection (well we could make one for ourself, but there is not much use for that). If we have found a connection we can send a route that loses it connectivity or we could send false messages to the host if the connection we have found don't use cryptation
Ex: false messages to send
DESTINATION UNREACHABLE
TIME TO LIVE EXCEEDED
PARAMETER PROBLEM
PACKET TOO BIG
The effect of such messages is a reset of the connection. The solution could be to turn ICMP edirects off, not much proper use of the service

C-14. BROADCAST STORMS
-------------------------------------
This is a very popular method in networks there all of the hosts are acting as gateways. There are many versions of the attack, but the basic method is to send a lot of packets to all hosts in the network with a destination that don't exist. Each host will try to forward each packet so the packets will bounce around for a long time. And if new packets keep coming the network will soon be in trouble.Services that can be misused as tools in this kind of attack is for example ping, finger and sendmail. But most services can be misused in some way or another

C-15. EMAIL BOMBING AND SPAMMING
---------------------------------------------------
In a email bombing attack the attacker will repeatedly send identical email messages to an address. The effect on the target is high bandwidth, a hard disk with less space and so on... Email spamming is about sending mail to all (or rather many) of the users of a system. The point of using spamming instead of bombing is that some users will try to send a replay and if the address is false will the mail bounce back. In that cause have one mail transformed to three mails. The effect on the bandwidth is obvious.There is no way to prevent email bombing or spamming. However have a look at CERT:s paper "Email bombing and spamming

C-16. TIME AND KERBEROS
-------------------------------------
If not the the source and target machine is closely aligned will the ticket be rejected, that means that if not the protocol that set the time is protected it will be possible to set a kerberos server of function

C-17. THE DOT DOT BUG
-------------------------------
Windows NT file sharing system is vulnerable to the under Windows 95 famous dot dot bug (dot dot like ..). Meaning that anyone can crash the system. If someone sends a "DIR ..\" to the workstation will a STOP messages appear on the screen on the Windows NT computer. Note that it applies to version 3.50 and 3.51 for both workstation and server version. The solution is to install the proper patch

C-18. SUNOS KERNEL PANIC
------------------------------------
Some SunOS systems (running TIS?) will get a kernel panic if a getsockopt() is done after that a connection has been reset. The solution could be to install Sun patch 100804

C-19. HOSTILE APPLETS
-------------------------------
A hostile applet is any applet that attempts to use your system in an inappropriate manner. The problems in the java language could be sorted in two main groups
Problems due to bugs
Problems due to features in the language *
* In-group one we have for example the java byte code verifier bug, which makes is possible for an applet to execute any command that the user can execute. Meaning that all the attack methods described in. D.X. could be executed through an applet. The java byte code verifier bug was discovered in late March 1996 and no patch has yet been available (correct me if I’m wrong!!!) Note that two other bugs could be found in group one, but they are both fixed in Netscape 2.01 and JDK 1.0.1 Group two are more interesting and one large problem found is the fact that java can connect to the ports. Meaning that all the methods described in. C.X. can be performed by an applet. More information and examples could be found at address

http://www.math.gatech.edu/~mladue/HostileArticle.html

If you need a high level of security you should use some sort of firewall for protection against java. As a user you could have java disable

C-20. VIRUS
------------------
Computer virus is written for the purpose of spreading and destroying systems. Virus is still the most common and famous denial of service attack method.It is a misunderstanding that virus writing is hard. If you know assembly language and have source code for a couple of virus it is easy. Several automatic toolkits for virus construction could also be found, for example

Genvir
VCS Virus Construction Set)
VCL Virus Construction Laboratory)
PS-MPC Phalcon/Skism - Mass Produced Code Generator)
IVP Instant Virus Production Kit)
G2 G Squared)

PS-MPC and VCL is known to be the best and can help the novice programmer to learn how to write virus..An automatic tool called MtE could also be found. MtE will transform virus to a polymorphic virus. The polymorphic engine of MtE is well known and should easily be catch by any scanner

C.21. ANONYMOUS FTP ABUSE
----------------------------------------
If an anonymous FTP archive have a writable area it could be misused for a denial of service attack similar with with .D.3. That is we can fill up the hard disk.Also can a host get temporarily unusable by massive numbers of FTP requests.For more information on how to protect an anonymous FTP site could CERT:s "Anonymous FTP Abuses" be a good start

C-22. SYN FLOODING
--------------------------------
Both 2600 and Phrack have posted information about the syn flooding attack. 2600 have also posted exploit code for the attack. As we know the syn packet is used in the 3-way handshake. The syn flooding attack is based on an incomplete handshake. That is the attacker host will send a flood of syn packet but will not respond with an ACK packet. The TCP/IP stack will wait a certain amount of time before dropping the connection, a syn flooding attack will therefore keep the syn_received connection queue of the target machine filled..The syn flooding attack is very hot and it is easy to find more information about it, for example

http://www.eecs.nwu.edu/~jmyers/bugtraq/1354.html Article by Christopher Klaus, including a "solution"
http://jya.com/floodd.txt 2600, Summer, 1996, pp. 6-11. FLOOD WARNING by Jason Fairlane
http://www.fc.net/phrack/files/p48/p48-14.html IP-spoofing Demystified by daemon9 / route / infinity for Phrack Magazine

C-23. PING FLOODING
------------------------------
I haven't tested how big the impact of a ping flooding attack is, but it might be quite big. Under Unix we could try something like: ping -s host to send 64 bytes packets. If you have Windows 95, click the start button, select RUN, then type in: PING -T -L 256 xxx.xxx.xxx.xx. Start about 15 sessions

C-24. CRASHING SYSTEMS WITH PING FROM WINDOWS 95 MACHINES
----------------------------------------------------------
If someone can ping your machine from a Windows 95 machine he or she might reboot or freeze your machine. The attacker simply writes
ping -l 65510 address.to.the.machine and the machine will freeze or reboot
Works for kernel 2.0.7 up to version 2.0.20. And 2.1.1. For Linux crash)
AIX4, OSF, HPUX 10.1, DUnix 4.0 crash)
OSF/1, 3.2C, Solaris 2.4 x86 reboot)

C-25. MALICIOUS USE OF SUBNET MASK REPLY MESSAGE
------------------------------------------------------------------------
The subnet mask reply message is used under the reboot, but some hosts are known to accept the message any time without any check. If so all communication to or from the host us turned off, it's dead.The host should not accept the message any time but under the reboot

C.26. FLEXlm
-----------------
Any host running FLEXlm can get the FLEXlm license manager daemon on any network to shutdown using the FLEXlm lmdown command
lmdown -c /etc/licence.dat #
lmdown - Copyright (C) 1989, 1991 Highland Software, Inc
Shutting down FLEXlm on nodes: xxx
Are you sure? [y/n]: y
Shut down node xxx
#

C-27. BOOTING WITH TRIVIAL FTP
--------------------------------------------
To boot diskless workstations one often use trivial ftp with rarp or bootp. If not protected an attacker can use tftp to boot the host

D- ATTACKING FROM THE INSIDE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

D-1. KERNEL PANIC UNDER SOLARIS 2.3
------------------------------------
Solaris 2.3 will get a kernel panic if this is executed
EX
$ndd /dev/udp udp_status
The solution is to install the proper patch

D-2. CRASHING THE X-SERVER
---------------------------
If stickybit is not set in /tmp then can the file /tmp/.x11-unix/x0 be removed and the x-server will crash
Ex
$ rm /tmp/.x11-unix/x0

D-3. FILLING UP THE HARD DISK
-----------------------------
If your hard disk space is not limited by a quota or if you can use /tmp then it`s possible for you to fill up the file system
Ex
while
mkdir .xxx
cd .xxx
done

D-4. MALICIOUS USE OF eval
---------------------------
Some older systems will crash if eval '\!\!' is executed in the C-shell
Ex
% eval '\!\!'

D-5. MALICIOUS USE OF fork
-----------------------------
If someone executes this C++ program the result will result in a crash on most systems
Ex
#include
#include
#include
main()
{
int x
while(x=0;x<1000000;x++)>

D-6. CREATING FILES THAT IS HARD TO REMOVE
-------------------------------------------
Well all files can be removed, but here is some ideas
Ex.I
$ cat > -xxx
^C
$ ls
-xxx
$ rm -xxx
rm: illegal option -- x
rm: illegal option -- x
rm: illegal option -- x
usage: rm [-fiRr] file
$
Ex.II
$ touch xxx!
$ rm xxx!
rm: remove xxx! (yes/no)? y
$ touch xxxxxxxxx!
$ rm xxxxxxxxx!
bash: !": event not found
$
(You see the size do count)
Other well know methods is files with odd characters or spaces in the name. These methods could be used in combination with ".D.3 FILLING UP THE HARDDISK". If you do want to remove these files you must use some sort of script or a graphical interface like OpenWindow:s File Manager. You can also try to use: rm ./ . It should work for the first example if you have a shell

D-7. DIRECTORY NAME LOOKUPCACHE
--------------------------------
Directory name lookupcache (DNLC) is used whenever a file is opened. DNLC associates the name of the file to a vnode. But DNLC can only operate on files with names that has less than N characters (for SunOS 4.x up to 14 character, for Solaris 2.x up 30 characters). This means that it's dead easy to launch a pretty discreet denial of service attack.Create lets say 20 directories (for a start) and put 10 empty files in every directory. Let every name have over 30 characters and execute a script that makes a lot of ls -al on the directories. If the impact is not big enough you should create more files or launch more processes

D-8. CSH ATTACK
----------------
Just start this under /bin/csh (after proper modification) and the load level will get very high (that is 100% of the cpu time) in a very short time
Ex
|I /bin/csh
nodename : **************b

D-9. CREATING FILES IN /tmp
----------------------------
Many programs creates files in /tmp, but are unable to deal with the problem if the file already exist. In some cases this could be used for a denial of service attack

D-10. USING RESOLV_HOST_CONF
-----------------------------
Some systems have a little security hole in the way they use the RESOLV_HOST_CONF variable. That is we can put things in it and through ping access confidential data like /etc/shadow or crash the system. Most systems will crash if /proc/kcore is read in the variable and access through ping
Ex
$ export RESOLV_HOST_CONF="/proc/kcore" ; ping asdf

D-11. SUN 4.X AND BACKGROUND JOBS
----------------------------------
Thanks to Mr David Honig <honig@amada.net> for the following
" Put the string "a&" in a file called "a" and perform "chmod +x a". Running "a" will quickly disable a Sun 4.x machine, even disallowing (counter to specs) root login as the kernel process table fills " The cute thing is the size of the script, and how few keystrokes it takes to bring down "a Sun as regular user

D-12. CRASHING DG/UX WITH ULIMIT
---------------------------------
ulimit is used to set a limit on the system resources available to the shell. If ulimit 0 is called before /etc/passwd, under DG/UX, will the passwd file be set to zero

D-13. NETTUNE AND HP-UX
------------------------
/usr/contrib/bin/nettune is SETUID root on HP-UX meaning that any user can reset all ICMP, IP and TCP kernel parameters, for example the following parameters
arp_killcomplete -
arp_killincomplete -
arp_unicast -
arp_rebroadcast -
icmp_mask_agent -
ip_defaultttl -
ip_forwarding -
ip_intrqmax -
pmtu_defaulttime -
tcp_localsubnets -
tcp_receive -
tcp_send -
tcp_defaultttl -
tcp_keepstart -
tcp_keepfreq -
tcp_keepstop -
tcp_maxretrans -
tcp_urgent_data_ptr -
udp_cksum -
udp_defaultttl -
udp_newbcastenable -
udp_pmtu -
tcp_pmtu -
tcp_random_seq -
The solution could be to set the proper permission on /sbin/mount_union
chmod u-s /sbin/mount_union #

D-14. SOLARIS 2.X AND NFS
--------------------------
If a process is writing over NFS and the user goes over the disk quota will the process go into an infinite loop

D-15. SYSTEM STABILITY COMPROMISE VIA MOUNT_UNION
--------------------------------------------------
By executing a sequence of mount_union commands any user can cause a system reload on all FreeBSD version 2.X before 1996-05-18
mkdir a $
mkdir b $
mount_union ~/a ~/b $
mount_union -b ~/a ~/b $
The solution could be to set the proper permission on
/sbin/mount_union
chmod u-s /sbin/mount_union #

D-16. trap_mon CAUSES KERNEL PANIC UNDER SUNOS 4.1.X
----------------------------------------------------
Executing the trap_mon instruction from user mode can cause a kernel panic or a window underflow watchdog reset under SunOS 4.1.x, sun4c architecture

E- DUMPING CORE
~~~~~~~~~~~~~~~~

E-1. SHORT COMMENT
-------------------
The core dumps things don't really belongs in this paper but I have put them here anyway
E-2. MALICIOUS USE OF NETSCAPE
-------------------------------
Under Netscape 1.1N this link will result in a segmentation fault and a core dump
Ex
http://xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx
xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx
< ... xxx.xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx.xxx.xxx

E-3. CORE DUMPED UNDER WUFTPD
------------------------------
A core dumped could be created under wuftp with two different methods
Then pasv is given (user not logged in (ftp -n)). Almost all versions of BSD:s ftpd -
More than 100 arguments is given with any executable command. Presents in all versions of BSD:sd ftpd

E-4. ld UNDER SOLARIS/X86
--------------------------
Under Solaris 2.4/X86 ld dumps core if given with the -s option
F- HOW DO I PROTECT A SYSTEM AGAINST DENIAL OF SERVICE ATTACKS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

F-1. BASIC SECURITY PROTECTION
-------------------------------

F-1.1. INTRODUCTION
--------------------
You can not make your system totally secured against denial of service attacks but for attacks from the outside you can do a lot. I put this work list together and hope that it can be of some use

F-1.2. SECURITY PATCHES
------------------------
Always install the proper security patches. As for patch numbers I don't want to put them out, but that doesn't matter because you anyway want to check that you have all security patches installed, so get a list and check! Also note that patches change over time and that a solution suggested in security bulletins (i.e. CERT) often is somewhat temporary

F-1.3. PORT SCANNING
---------------------
Check which services you have. Don't check with the manual or some configuration file, instead scan the ports with sprobe or some other port scanner. Actual you should do this regualy to see that anyone don't have installed a service that you don't want on the system (could for example be service used for a pirate site).Disable every service that you don't need, could for example be rexd, fingerd, systat, netstat, rusersd, sprayd, pop3, uucpd, echo, chargen, tftp, exec, ufs, daytime, time... Any combination of echo, time, daytime and chargen is possible to get to loop. There is however no need to turn discard off. The discard service will just read a packet and discard it, so if you turn off it you will get more sensitive to denial of service and not the opposite.Actual can services be found on many systems that can be used for denial of service and brute force hacking without any logging. For example Stock rexec never logs anything. Most popd:s also don't log anything

F-1.4. CHECK THE OUTSIDE ATTACKS DESCRIBED IN THIS PAPER
---------------------------------------------------------
Check that attacks described in this paper and look at the solution. Some attacks you should perform yourself to see if they apply to your system, for example
Freezing up X-Windows -
Malicious use of telnet -
How to disable services -
SunOS kernel panic -
Attacking with lynx clients -
Crashing systems with ping from Windows 95 machines -
That is stress test your system with several services and look at the effect
Note that Solaris 2.4 and later have a limit on the number of ICMP error messages (1 per 500 ms I think) that can cause problems then you test your system for some of the holes described in this paper. But you can easy solve this problem by executing this line
/usr/sbin/ndd -set /dev/ip ip_icmp_err_interval 0 $

F-1.5. CHECK THE INSIDE ATTACKS DESCRIBED IN THIS PAPER
--------------------------------------------------------
Check the inside attacks, although it is always possibly to crash the system from the inside you don't want it to be to easy. Also have several of the attacks applications besides denial of service, for example
Crashing the X-Server: If stickybit is not set in /tmp a number of attacks to gain access can be performed
Using resolv_host_conf: Could be used to expose confidential data like /etc/shadow -
Core dumped under wuftpd: Could be used to extract password-strings -
If I don't have put out a solution I might have recommended son other paper. If not I don't know of a paper with a solution I feel that I can recommend. You should in these causes check with your company

F-1.6. EXTRA SECURITY SYSTEMS
------------------------------
Also think about if you should install some extra security systems. The basic that you always should install is a logdaemon and a wrapper. A firewall could also be very good, but expensive. Free tools that can be found on the Internet is for example
TYPE: NAME: URL
LOGDAEMON NETLOG ftp://net.tamu.edu/pub/security/TAMU
WRAPPER TCP WRAPPERS ftp://cert.org/pub/tools/tcp_wrappers
FIREWALL TIS ftp://ftp.tis.com/pub/firewalls/toolkit
Note that you should be very careful if building your own firewall with TIS or you might open up new and very bad security holes, but it is a very good security packer if you have some basic knowledge. It is also very good to replace services that you need, for example telnet, rlogin, rsh or whatever, with a tool like ssh. Ssh is free and can be found at URL
ftp://ftp.cs.hut.fi/pub/ssh
The addresses I have put out are the central sites for distributing and I don't think that you should use any other except for CERT
For a long list on free general security tools I recommend: "FAQ: Computer Security Frequently Asked Questions

F-1.7. MONITORING SECURITY
---------------------------
Also monitor security regular, for example through examining system log files, history files... Even in a system without any extra security systems could several tools be found for monitoring, for example
uptime -
showmount -
ps -
netstat -
finger -
(see the man text for more information)

F-1.8. KEEPING UP TO DATE
--------------------------
It is very important to keep up to date with security problems. Also understand that then, for example CERT, warns for something it has often been dark-side public for sometime, so don't wait. The following resources that helps you keeping up to date can for example be found on the Internet
CERT mailing list. Send an e-mail to cert@cert.org to be placed on the list -
Bugtraq mailing list. Send an e-mail to bugtraq-request@fc.net -

WWW-security mailing list. Send an e-mail to Sharp.Soft@yahoo.com

F-1.9. READ SOMETHING BIGGER AND BETTER
----------------------------------------
Let's start with papers on the Internet. I am sorry to say that it is not very many good free papers that can be found, but here is a small collection and I am sorry if have have over looked a paper
The Rainbow books is a long series of free books on computer security. US citizens can get the books from
INFOSEC AWARENESS OFFICE
National Computer Security Center
9800 Savage Road
Fort George G. Meader, MD 20755-600
We other just have to read the papers on the World Wide Web. Every paper can not however be found on the Internet
"Improving the security of your Unix system" by Curry is also very nice if you need the very basic things. If you don't now anything about computer security you can't find a better start
"The WWW security FAQ" by Stein is although it deal with W3-security the very best better on the Internet about computer security
CERT has also published several good papers, for example
Anonymous FTP Abuses -
Email Bombing and Spamming -
Spoofed/Forged Email -
Protecting you from password file attacks -
I think however that the last paper has overlooked several things
For a long list on papers I can recommend: "FAQ: Computer Security Frequently Asked Questions"
Also see section ".G. SUGGESTED READING"
You should also get some big good commercial book, but I don't want to recommend any

F-2. MONITORING PERFORMANCE
----------------------------

F-2.1. INTRODUCTION
--------------------
There is several commands and services that can be used for monitoring performance. And at least two good free programs can be found on Internet

F-2.2. COMMANDS AND SERVICES
-----------------------------
For more information read the man text
Netstat Show network status
Nfsstat Show NFS statistics
Sar System activity reporter. Vmstat Report virtual memory statistics. Timex Time a command, report process data and system activity. Time a simple command. Truss Trace system calls and signals. Uptime Show how long the system has been up. Note that if a public netstat server can be found you might be able to use netstat from the outside. Netstat can also give information like tcp sequence numbers and much more

F-2.3. PROGRAMS
----------------
Proctool: Proctool is a freely available tool for Solaris that monitors and controls process. ftp://opcom.sun.ca/pub/binaries/
Top: Top might be a simpler program than Proctool, but is good enough

F-2.4. ACCOUNTING
------------------
To monitor performance you have to collect information over a long period of time. All Unix systems have some sort of accounting logs to identify how much CPU time, memory each program uses. You should check your manual to see how to set this up. You could also invent your own account system by using crontab and a script with the commands you want to run. Let crontab run the script every day and compare the information once a week. You could for example let the script run the following commands
netstat -
iostat -D -
vmstat -

G- SUGGESTED READING
~~~~~~~~~~~~~~~~~~~~~

F-1. INFORMATION FOR DEEPER KNOWLEDGE
-------------------------------------
Hedrick, C. Routing Information Protocol. RFC 1058, 1988 -
Mills, D.L. Exterior Gateway Protocol Formal Specification. RFC 904, 1984 -
Postel, J. Internet Control Message Protocol. RFC 792, 1981 -
Harrenstien, K. NAME/FINGER Protocol, RFC 742, 1977 -
Sollins, K.R. The TFTP Protocol, RFC 783, 1981 -
Croft, W.J. Bootstrap Protocol, RFC 951, 1985 -
Many of the papers in this category was RFC-papers. A RFC-paper is a paper that describes a protocol. The letters RCS stands for Request For Comment. Hosts on the Internet are expected to understand at least the common ones. If you want to learn more about a protocol it is always good to read the proper RFC. You can find a nice sRFC index search form at URL
http://pubweb.nexor.co.uk/public/rfc/index/rfc.html

F-2. KEEPING UP TO DATE INFORMATION
------------------------------------
CERT mailing list. Send an e-mail to cert@cert.org to be placed on the list
Bugtraq mailinglist. Send an e-mail to bugtraq-request@fc.net 3- WWW-security mailinglist. Send an e-mail to www-security@ns2.rutgers.edu
Sun Microsystems Security Bulletins
Various articles from: - comp.security.announce
comp.security.unix -
comp.security.firewalls -
Varius 40Hex Issues

F-3. BASIC INFORMATION
-----------------------
* Husman, H. INTRODUKTION TILL DATASÄKERHET UNDER X-WINDOWS, 1995
* Husman, H. INTRODUKTION TILL IP-SPOOFING, 1995
* The following rainbow books: - Teal Green Book Glossary of Computer Security Terms)
* Bright Orange Book A Guide to Understanding Security Testing and Test Documentation in Trusted Systems
* C1 Technical Report-001 (Computer Viruses: Preventation, Detection, and Treatment)
Ranum, Marcus. Firewalls, 1993
* Sun Microsystems, OpenWindows V3.0.1. User Commands, 1992
* Husman, H. ATT SPÅRA ODOKUMENTERADE SÄKERHETSLUCKOR, 1996
* Dark OverLord, Unix Cracking Tips, 1989
* Shooting Shark, Unix Nasties, 1988
* LaDue, Mark.D. Hostile Applets on the Horizone, 1996
* Curry, D.A. Improving the security of your Unix system, 1990
* Stein, L.D. The World Wide Web security FAQ, 1995
* Bellovin, S.M. Security Problems in the TCP/IP Protocol, 1989

__________

Source: www.sharp-soft.net

Sponsored Links

Chat Yahoo

Yahaven! V2.7.2
D-Aliance Y! Mobile
Dragonz Messenger
TownDL Chat V1.0
Yahoo Ilocano Greyhoundz
Cheeta Chat V7.5.1481
Yahaven! V2.7.1
Room TKO V1
Voice Client - Puddy Mini Client
Room Bete Update Version
All Yahoo! Messenger Version
Cuztomized Room Spammer V.6
Yahaven! Version 2.6.8
Y-metal 1.3.0
Room Dominator
Y!mlite 304 Beta 1
Y!Supra Version 1.0.0.31
Y! Intai 2.F
Cheeta Chat Client V 7.5.140
Y!Suffer V9.1.0 Chat Client
Marcus Owns Client Spy Software
Yah! Auto Reply Messenger version 0.30.0123
Y!TunnelPro V2.5 Build 504 Beta - Messenger 8.1 and 9.0
Y!TunnelPro V2.5 Build 498a - Messenger 8.1
Y!TunnelBasic V2.5 Build 498a
Y-Metal Chat Client Version 1.2.2
Y-Lionz Room Spammer Software
Pinoy Coderz Room Locker
YTKPro 1.5 Build 498
Y-Lionz Room Spammer
Sxleton Warrior V.1.0.3 Chat Client
Yah! Auto Reply Messenger (YARM)
Dragonz Room Disturbance
Yahelite
Room Demolition Ver 4.1
Yhook 552
Yahaven Version 2.6.0
YTK 1.5 build 494
Lagg That Room
Room Demolotion
Ym Hook Alpha Chat Client
Pinoy Room Conquer 11
YTK Pro 1.5.0.494
Yah Earth Version 4
Yhook 542
Ymsgr 9.0.0.1912
Yahoo ACE V1.0.0.569
Room Destroy V 59 Updated by Strange Shahn
Room Domination 8.0
Yahaven Version 2.5.9
Y!safe Beta Yahoo Chat Client
Pinoy Room Conquer V9
Y!hook 5.26 Chat Client
Pinoy Room Conquer V8
Shit Party Yahoo
Pinoy Room Conquer v7 Yahoo Client
New Chat Killer V30
Y-Lions Multi Room Message & Multi Room Pm Spammer
YahooACE V1.0.0.569 By Brian Meeks
New Yahelite for Download
Super Spy v28
Free link download Chat Supremecy V4.4.0
YTK Pro
Mencuri Webcam dengan Yintai
No5
Pidgin multi-protocol Instant Messaging
Konfigurasi Pidgin untuk Room Yahoo Messenger
Install Pidgin 2.3.0
Easy Chat Room Yahoo with yahelite
Ytk Pro
Download YTK Pro
yam
Download Yam
Room Domination 7.0
Chat Killer V24
Room Destroy
Elite Chat
Pidgin 2.4.0
Chat Killer V29
Chat Killer V27
Chat Killer V28
Yintai
Scan Yahoo Id Name Scanner By Slayer
Fast N Ez Scanner
Extreme Name Scanner
Name Scan By Killer
Crack Id Yahoo Messenger Hypersonic
CrackerDotNet Beta
Boon Dogs Kleptomaniac
Bulldozer 1.3
Consumption-1.02
Viper unleashed
CrackHouse Vengeance v1.0
Illy Ownage
Stfu & Crack By Hypn
Underworld Cracker
Vipra Ncc V2.0
Vipra Ncc V5.0
Dragonz WaR Cracker
Proxy Master V3.0 By WALT
Proxy Grab V.06
Y! Buddy Controller
Proxified
Cap Size Id Scanner
Ncc The Bitch V1.0.1
Viet ncc v2.0 Cracker Yahoo Id
Confirmed Cracker
Menghapus id yahoo messenger
Y Server Control V3 For Crack Yahoo Id
Kriptonite v3 for Download Crack Id Yahoo messenger
Free Download EnrangedX
Free Download scream 3.0
Y! Jacker Proxy Cracker
Free Download Heetseeker
Create Id Boot The Enigma 2.1
BTMR (Bot Maker)
Y-Action Multi Id Maker V.2
Bots Box (Multi Yahoo Id Maker)
Matrix Palestine Id Maker
Unlimited Group
Viprasys Id Maker
Pro Id Maker + Att.net Video Tutorial
Totzy Roll Multi Id Maker
Y! Masturbation 1.0.0 Multi Yahoo! ID Maker
Puddys-World Botmaker
YCC Yahoo! Bot Maker Version 2.2.2
Puddys World Botmaker (Final Unless Patched)
Puddys World Botmaker v 6.3
FAL Blood In Blood Out Bot Maker
Yah Fun Working Bots Makerr
IC Soldier V1.0.9 Yahoo Id Maker
CP Bot Maker Version V6.0
The Enigma 2.0
YCC Yahoo Bot Maker 2.0.1
Yahoo Chat Bot Maker v 1.0
Maker Mortificationcreation 8.0
Boot Maker Yahoo ID 7.0
Dragonz Factory Bots Maker
Chronic-Coderz.NET Bot Maker v2
Y-Lions Bots Maker V2
Chronic Coderz Bot Maker
YCC Yahoo Bot Maker
Yahoo Swat Team id Maker
The Illusionist Yahoo Id Maker
Fast ID Maker 10
Y Lions Bots Maker
Viprasys ID Creator
CP BotMaker Reborn
I Robot Creation
Ascii id maker
YCC Bot Maker V1.2
Fast ID Maker 8.0
Puddys-World Botmaker v 4+4.1
Create Id Yahoo Att.net Maker
Revoxlu3s Big MakeR Yahoo Id
BT internet maker by Kadmiwe
The Enigma 1.6 Yahoo Id Maker
Tutorial Create id Yahoo @kimo.com
New Create Yahoo id@rocketmail.com
Free Download EgY Booter
Free All Star List Generator
id@yahoo.cn
id@btinternet.com
Id@y7mail.com
Btinternet Maker
Proxy Validation Proxy Software
ProxyGrabber
Jamaica Socks Scaner V2.5
Socks Leecher
80 Proof 2.0
Multi Socks Scanner
Port Spliter
Spider HTTP Proxys Get V1.0
6 Sic 6 Range Scanner
Zdc socks scaner
Proxy Switcher Pro
Proxy
Proxy Pro by Arachnid-X
Proxy Grabber 5.21
Leech V3 Update and Fixed by _PLaNeT___
Heaven Socks Scanner v1.0
Proxy Grabber 5.21
Proxy Finder v2.0
Proxyfire Master Suite FREE 1.22
Yahoo ! Club - Cracker
Anonymous Friend v2.9
Palestine Proxy Graber
Voice Y! Mic Locker
Y! Beep Reloaded Again
MnT Magnum Voice Extreme Trial
Power Of Voice V1.0
Mac Ghost Update (Voice)
Y!Beep 2 (YBeep 1.0 Original By Dazza)
MaX Vox 1.3
The Ghost Voice Domination
Live voice
Vista Voice chat Fix for Yahoo!
Voice Yah Fun Locker
EX1R The Voice Lagg
Yah Room In Hand And Abuse Report
Lock VoiCe KosOmaK Lovely Hema
Power mic Yahoo Messenger 2.1.0.0
X Vox Net Software
iLock Software
MnT Magnum Voice - Gold Edition
Yahoo Voice Recorder Software
Y!Corrupt Vox V16.0.0.1 Delta Software
Y!Corrupt Vox V16.0.0.1 Delta
Power Mic for No5
Dr Romeo Mic Locker
Fighter Vox V1
Nepal Yahoo locker Mic
Y! Messy Voice v1
Super Bike Mike Lock v1.4
Power Mic Yahaven
Power Mic Yahelite
Power Mic For Yazak
Win Amp Status
MnT Magnum Voice 2.0
The Sniper 3.0 by FLZ
Donkey Punch Y!Beep
The Sniper 3.0
Dark VOx
iTunes Status for YIM!9
WinAmp Status Changer
Download Untouchable Vox 1.2
Ghost Room
Bomb Vox2
Yahvox Domination V3
Super Mic Locker
Vc guard Beta
Yah Room Vox By RMH
Evil Voice for Room Yahoo
Soft Vox V6 Good Voice Domination on Yahoo Room
Download Voice Domination Mass Iggy 3.0
Webcam YCC Cam Cap Tool
WebCam Vampire Software
Webcam attack V 1.0
Web Cam Attack
Cam Studio
1st Screen Recorder
Oripa Yahoo Web Cam Recorder
Unlocker Id Yahoo Unlock Your Yahoo Id
Unlocker Id Yahoo
Delete Yahoo Id Yahoo Terminate Yahoo Id / Delete Yahoo id
Lock id Y! Dragon Locker V1.0
Yahoo Id Locker
Yahoo ID Locker
Locked 12
Viet Locker
Yahooz Fynest Acc Locker V 2.0
H-Ban Yahoo Id Locker Tool
YPS Lock Software
Dead Bolt V1 - Account Locker
Account Locker Knobb 3 Software
2 Fast 2Furious V1.0 Software
Win-aQua Real Acc Locker
Locker Y!ID v 1.0
Alien Lock
Dragon-Locker Final V2 ( Public Version)
Lamer-Tamer Account Locker
Viprasys Tightlocked
Locker Y ID 4.0
Super ID Locker v2.0
7778QU-KO Lock Yahoo Id
Account Locker V3.0
Lock The Homo
G.T.S Go To Sleep Id Locker
Shit Locks
Secret Account Locker Beta
Y! Spy Account Locker
Hackahoo Locka Focka v1.3
Y! Multi Locker by Killer Keygen
Dcs Paradise Dead Lock
Y! Spy Account Locker
Lamer Locker V2 Lock Yahoo Id
Shit Locks to Lock Yahoo Id
Yaho0o's Super Account locker
ID Locker to Lock Yahoo Id
Spammer Dark Tunnel Chatterz Spammer
Unlimited ID Spammer V2.0 Full (Final)
Room Demolition V5.7
Chilli's Copy Cat Bot
Welcome Anti Yahoo V1.0
Phenom Room Spammer Tool
YSpam Tool Yahoo Messenger
For Simple PM Spammer For Yahoo Messenger
Pm Spammer WD Pm Spammer
Yahoo PM Spammer Chambers Owns Mass
Server Yahoo Server Scan Elite V.1 and List Update Server
Tools Y Informer - YM Id Scan Utility
All In 1 V.2
I-F Multi Online Checker V1.2
CP-Triples-Tools
Br@vo Zone Pw Changer
Zaks Yahoo Tattoo V2.00.0
tCoolStatus
Y! Dominatrix Fiexed
The Bz Room Spammer V1.0
YahNation Tools
Cyber Scan
Y-Corrup Pw Changer
Grind Yahoo V.1
MADD (Mass Add Deny Delete) Buddy
Avability Checker
Y-Corupt Profile Checker V1
Y-G NickName Maker
Dark Tunnel Multi ID Maker V.1.0 Beta
Tower NickName Maker
U-W Profiles Viewer
Id Maker
Nick Name Maker
Y-E Avator Grabber
T3chno Owns Online Checker
I Cant Find The Name Of The Program
Faster Password Changer
D-W- Y! 14 tools
Y!Grabber
Change Info
Bot List Maker V.2
Ostad Faramarz Room Fuller
Online Checker
NeverMind!! Profile Info Grabber
D-Alliance Id Scanner V.4
King Id Grabber
Aliance Lover Radio Online
Yahoo-Ampire Profile Viewer
D-W Bots Checker
All In One Online Checker
Dam3on Y!T
Bots Checker V1.0
Ycabby 2
Nick Name Changer V2.0
PakiDevil Id Reactiver
Profile Viewer
Dragonz-World Buddy Denny
Edit NickName More Easy! V2
D-W Y!multi
Bo0oter.tk Y!Tools
Paki Devil Id Deactiver V.1
Dragonz World Id Maker V2
Yahoozie Tools
Scream Room Mass
Dragonz World Profile Viewer
Check Profile Yahoo Id Old Link V1.0.0
Detect My IP Address
Super Profesional Id and Password Maker V1.0
Half-open limit fix (patch) for Windows
Under World Bots Checker
Yahoo Account Tool Ir Silent
Conference Booter V3.0
Yahoo masterZ Toolz
Dragonz World Bots Format Changer
Dark-Tunnel Admin List
Pal Team Id Maker
Bot Active Checker V2
Reg Y! 10 Multi
Master's Grabatar
Dragonz World Id Maker
Yahoo! Messenger 10.0.0.331-us
Y!Action Deactiver
New Program Deactive & Reactive
Mother of 3a2rb Id Deactive
Y-Bomb Passy Changer
Dragonz World Profile Viewer
Y--Bomb Account Terminater
Y-RaRe Tools
Blue Online Checker
Xpert Get New Pas 1.0.0.5
Yahoo MasterZ ™ Duplicate Remover V 1.0
Yahoo Action Online Checker
T.8 Online Checker
Dark Tunnel Deactiv Checker V1.0
Dark Tunnel Multi Online Checker
Nb. Clan Nick Name Changer
Master Yahoo Tools
Saker-Iraq Bots Checker V2
Yahoo Master Nick Name Maker
Locker V3
Decent Bot Checker 8
Avatar Viewer
Bo0oter.tk Invisible Checker
Email Bomber
Bot List Creator
Y Bomb Online Checker
Ksoze's RemDupes V2.0 1999
Y-rare Avatar Viewer
Bot List Convertor
Pro OCX and DLL Register V1.0
Yahoo Mastez TM Linker V1.0
Yahoo Zone Password Changer
Pali Bots Checker V1.0
VoodoWares Avatar Thief!
Y! Profile Viewer
Mass Buddy Deny
Nick Name Maker
Dark Multi Denny
Dark-Profile Checker
Information Viewer
Iraqilions Y!Invisible Checker
Y! Caption Changer
Pall Nick Name Maker
Y! Privat Talker
Right click ocx and dll register
Room Name Converter
Viprasys multi online checker
Y! Tools Kos Om Modamer & Hakorey
Yahoo Buddy Deny
Vipra Buddy Deny
Account Tools
BTinternet Maker
Spy a client 1.0
YaHoo Master Multi Yahoo
Yahoo W--ind all usefull Links
Viprasys Password Changer
Novin Yahoo Linkes
Nick Name Maker
Yahoo Masterz Avator Grabber
Nb.Clan Bot Checker
Sil3nt D34th Nick Name Maker
Edit nickname easy!
IR List Pw Changer
A New Chapter Profile Viewer
Raavanan Name Maker
Cults Multi Messenger
Yahoo! Tools V1.o
Gen A Murda
The Server Scanner V.1
The RNPG V2
Scar-Face Id Scanzo
Raavanan Annoyer
Silent Death Online Checker
List Cleaner
Online Checker V1.0
Old Profile Check
Patch Yahoo
Fx Yahoo Nick Name Maker
Byde Online checker
Dragonz-Multi Denny Buddy
Room Users Grabber
Insane Mega Tool Browser
Hypocrites Deletion + Enlightened Vision
Y!Members Final Webcam Checker
Yahoo Invisible Checker V3
Cowboy's Buddy List Transfer V1
Convertor id to email
Room Dominator
Reactive Yahoo Id Free 1.1
Master of Tools
Y-Hell List Tools V1
BoY-Rules ASCII Nick Name Maker
Yah Fun Botz Checker
M-K List Converter
Room Dominator
Fatal Error Name Organizer
Yah-Fun Tools V2.1
SBY 10 V - V1 Avatar Graber
Nofozgar ASCII Nickname Maker
Unbootable Yahoo ID
Manage Members Yahoo
Krombo Denny Buddy Tool
YahMart Greeter Tool
Perfect Multi Pass Changer Tool
Yahoo! Spy Tool
Master Detector Tool
Isenk Boot Checker.V.1
Alla and dam3a Webcam Scanner
Voodo Wares Multi Pass Changer
Phenom Botz Checkz Tool
Kold-Fussion.com Duplicate Remover Tool
Denny Buddy Tool
Yahoo Banners Kller Tool
I-C-P Image Grabber Tool
M-D-I Smart Buddy Spy Tool
Chambers Pass Changer Tool
Y-Hell Profile Editor Tool
Yahoo Invisibility Checker Pro
Phenom Password Changer Tool
Buddy Remover
Y! Avatar Hcker Tool
Y! Invisible Check Tools
Y-Fighter CrabThat
Virus Effect Remover 2.4
Elite Clone N Tools v2 + Yahelite
S-W Screen Capture Software
Yah Illy Chatter Nabber Software
Show Avatars
ST CapsLock Controller
Yahoo Magic Avatar
Warehouse Name Grabber Software
Marichal Lagger Software
Sevda Pass List Maker
Chambers Warehouse Botchecker
IP-Dos Software
Y-Spy Room Jammer! Software
Yahoo! Multi Avatar Saver 3.0
Transfer Buddy Yahoo Messenger
Main Account Detector
Flip It beta Password Changer
Yahoo ! Manager Version 1.2
Multi Password Changer Software
Online Checker Software
Annoy Friends Software
Yah User Info Grabber V2
Insane Realm`s Profiler v1
Y! Tools (Yahoo! Tools)
Fake Status Maker Software
Y-Hell Strong Online Checker V1.0
Detect Client
Dizzy Nick Creator
Y-Hell Strong Bot Checker v1.0
The Machine v 2.0
Room Security Software
YD Invisible Checker
IP Tracer
Yahoo! Messenger Status Scroller
Viet Tools V3.0
Super Yahoo Messenger Archive Decoder
Ad Destroy V4.2
Subs UPD Flooder
BeBe Chatinha Y Tools 2009
The Machine V1
REGI : Reg Ocx or DLL
Perfect Multi IDs Checker
Dragonz Bots Heaven
Multi Password Changer
Room Demolition 4.7
Angel's Buddy Tools V.1
Novin Security Bot Checker
Yahoo Messenger Tweaker
VoodoWares Multi Password Changer
Voodowares Name Grabber V2
Palestine eyes
YP Online Checker V1
Yahoo Message Archive Decoder 4.1 Pro
VoodoWares Yahoo Password Changer
Nick Xpress
IP Tools
Fighter Room Booter
Buddy Deny
Memory Remains
Y Cracker Bot Checker
Y Buddy Denied
Y Fighter pm Spammer
Hellz Pass Changer
Dark Check v1.0
Yahoo Messenger Multi Patch
IP Force
Invisible Yahoo Messenger
Chambers Multi room Name Grabber V1.2
FX RooM LaGGeR V1.0
Check Victim Location With IP
Matrix Annoyer
I Killer by Alikhoub
Nice Status
W@ Yahoo Multi Tab V1
Multi Yahoo
Client Detection
Prixi Status Changer V1.0
Alien-warez Y!M Multi Maker v 1.0
Yahoo UnlockV1.2
x-netstat-professionalv55-download
Voodo Bot Tester v.1
Register OCX and DLL Tool
ViCiOuSPassGen2.0
Bluriee-Password Generator
Scanneration 2.0
Scanneration
Y-S ID Leecher 3.0
Web Browser Download Mozilla Firefox 3
Download SeaMonkey Browser
Google Chrome
Apple - Safari Browser for Windows
Killer Browser V2
Evil Web Browser Beta
News New Room Keys Yahoo
Song for Gaza: We will not go down

Boot

Br@vo Zone Bomber
Viprasys Dc All Client V1.0
Yahoo-Empire Booter V1.0
D-World Boot
DW Mz. Tsinelas Messy Destroy
Little Trouble Maker
One Bot SSL Login Expl0it V-4
Hard Kimmeys World Booter V1.0
Messy Destroy V1.0
Bravo Lagg V1
R4 S-Booter V3 Public Version
DC Kill V1.0
Attack Of The Clones
Cliente Loger
Dam3on Y!Disaster Boot V1.0
Y! Messy Error V6
Flood Boot V1
Stop Booter V.2
Satan Killer V1.2
D-Alliance Boot
The Forces Boot
Exploit Dropper 3
Raid Version 10
Stop Booter V.1
PM Factory
Sxleton-Warior Boot V1.0
JooCe
D-Alliance Kill V1.0
Stop Firing V7
Strange-Shahn Boot
The Last Warrior 1
PakiDevil Messy Kill
Samad Khan V.5
Arctic Monkey
Haze 2009
YM Smaker V.1
Slye & Marichal
Disconnect 3.0 (Public)
D-Alliance Booter V1.0
Hell Explosion V1.0
PakiDevilz FreeZer V1.0
D-W Boot
Yahoo Boot Revolution V1.0
Conference Crips And Bloods Killer V1.o Full
Denmark Dogs World V1.0
The Changcuters II ( SSL Login Booter )
Toxic Tools Beta
ReMi - Inc.net
Ladyboy Johnllope Headache
Korn
Dragonz World Booter V1.0
1 Bot SSL Login Exploit V2
Yahoo Ilocano Greyhoundz
Y!DC Asker
1 Bot Kill
Pepsi Exploit Reborn
1 Bot Bitch
C++ Error // Jammer V.2
Yahoo File Sender Annoyer
1 Bot Bitch
C++ Error Jammer
Yahoo Terror Strike V.3
Pal Victim Killer V2.0
Chill Factor (Room Booter) Free
Pal Victim Killer
Lady Boy Expulsion
Black Magic 3
Smart DC V1.0
Sewot Messy Killer
Dark Tunnel Y!Lagger
Logout Loop
Tap Out V.6
Data Error V2
War Of Booter - Ressurection
Refill
VoodoWares - Black Magic 2
Messy Destruction
Sexy Booter Y-Tools
Room TKO V1
Multi WAP Exploit
Y-Action Add Bomber V2
Single Shot Killa
Bye Bye Victim Victim
Dragonz Snow Booter
Yahoo Master Easy Boot
United Arab
YLC Killer Booter
United Arab V2
Add Me Please
YMSGCli Multi Boot
One Bot Disconnector
Let Me Know
Messy Error
The Lagging Machine......!!!
BlackWidows Dog Bytes boot Yahoo
My Final Card boot for Yahoo
Y!-ir=evlis Booter boot for Yahoo
Tigerus Vi Boot For Yahoo
ECT V 2.0 Boot For Yahoo
Second Boot Exploit boot for Yahoo
Wanna Be Bot all boot for yahoo
Room Eviction Nice Room spamer
Muridnakal SIlent Super Booter V2
Ytunnel smasher boot for tunnel
The Therminator V2 boot for yahoo
S3rial Killer Reborn V1 boot Yahoo
Manuel Ownz by S3rial Kllers boot for Yahoo
Caution boot for yahoo or chat client yahoo
S3rial Final Example boot for yahoo
Yah Mart Total Overload boot for yahoo or chat client
Red Hoot Yahoo Boot or chat client yahoo
Vamp Angel Client Killer boot for yahoo or chat client
Elite V1.0 boot for Yahoo messenger or Chat client
God Of Boot Warr Version 1.0.0 boot for Yahoo
The green hornet Boot for Yahoo
Pm Nikker V1 Boot for Yahoo
Counter attack v10 Boot for Yahoo
Free download 30000 Destroyer Packets
Download Quick Kill 5.0.5 Boot Yahoo
Twisted Fury v2 Boot For Yahoo
Buffer OverLoad V3 Boot For Yahoo
Download Buffer OverLoad V3 boot yahoo
Knobb Muridnakal Freeze.V1 Boot Yahoo
The Booter boot for Yahoo and chat Client
DarkStar Multy Hitter V2 boot Yahoo
Download Kch Bites Back V1 boot for yahoo
Download Floodgate Boot for Yahoo
Download Dark Start Multy Hitter V2
Download Boot War yahoo Messenger
Download Crooked Convict Boot Yahoo
Download Operation nb V2
Free Haze Reborn boot
RAID 5000 Boot Login for client or Yahoo messenger
Boot Red Rover boot for Yahoo messenger
PM Pandemonium boot for Yahoo or chat client yahoo
Awakening Boot yahoo messenger
Y-Soft Super DC 1.0 multi bots login
Pick n Mix Boot fo Yahoo
Remi`s Shooting Machine Boot for Yahoo
Master Dc Boot for Yahoo
Saints Revenge Boot for Yahoo
Anarkis Boot for Yahoo
5 Stars Boot For Yahoo
Yah Lethal Pro V9 Boot
White Man Sexploit V1 boot
R.A.I.D 4.0 Boot
C-P Total Pressure
FaL ErAdIcAtIoN V.3 Booter
Paki Gang Destruction V2.0 boot for Chat Client
DA killer Booter Customize Boot For Client
Error Zone Hitter Boot with 12 hitting
Awakening 1.5 Boot for Client Yahoo
Iiivirsiii boot for client yahoo
New World Order Boot for Client and YM
Y! Burning Machine from www.jakarta-yahoo.com
Error V2.5 By S3rial-Killers
YahTard Exterminator By:Smokey & M4infr4m3
Vampiro's Client Killer
Smart Y!Chat Basher 2.5
Sonic Boom Boot For Ym or Client
Einstien boot for Yazak yahaven and yahelite
Bye bye boot
Kaner Gorae V1.0 By Terror
Kaner Gorae v2.0 by Teror
Gatecrashers realm y!basher
Novin booter
Up In Smoke Yahoo Booter
P.o.S Booter by Hypn
Yah Inferno Skull Bash
S3rial-Killers Reborn V2 Exploit Fix2
Yah-Mart ASL Bomber V2
A Grimp Kill
Yah - Mart - YMSG - DC
Stomp 2 by Voodo Wares Boot
Strawbery Ownage Boot
Room Slayer
Elite Und4ground Reborn
The Elite Boot Version.3
Bloody Mary By Satma
Y! Massacre By Satma
Nwo 2.0 yahoo booter
Flood Gate v2 yahoo
Night Dementor V1.0
Virus killer worst nightmare v1 yahoo
Shroomy 4 trip on this
VNP Fast Killer V.2 Boot Yahoo
Client Cast for Client and mybe Yahoo messenger
Messy go Poof
ESB Free V1.0
Volt Smack Booter
Yahoo's Lamest
EXSilentDC for Yahoo Messenger
Gatecrashers-Realm YBasher
Yah-mart Security for Yahoo Messenger
Cyb3rAtomix boot for Yahoo messenger and Client
Yah Domination v1
Evil Return By Virs & Camster 98
ThisShitOwnzV3
EX Silent DC V2
Virus Killer Worst Nightmare V2.0
Legion Of Chaos
Black Widow Deadly Attack
Error Final for yahoo messenger and client
YR Fatal Attraction
One Bot Kill Exploit
Y!mLite Room Booter with Dazzas project1
MnT Dust Boot
Nikkis ASL Bomber Lamer Suicide Beta
Awakening 3.0 Free
New Haze Reborn Fixed
New D3ath Begin
Client Cast
Diablo! v 1.0
New Y-Trouble Smacker Fixed
EXSilentDC
New Kick Bomb v1
Client Sniper
Usuck chat Faggot
Yah Freak V1.0 Boot
The Elite Boot Ver.4
EX Silent DC V7 Booter
Skull Crusher Update V2.0 Boot
D3ath-Zone Resurrection Boot
Hackahoo Lagg a Fag v2.3
G Rock.Ownz v.2
Exploited Clients Terror V 7.0
NWO - NO Way Out Lamer V.1
DzPRFinal Booter
Samad Khan Booter
Black Beauty
Yah Distroyer Booter
Yah-Mart Customer Service
YahTard Exterminator II
YahNerd Domination v.1
The Elite Boot Ver.5
Aussie Battler Boot
Adnan Lamers Punisher Boot
Y-Spy Powerfull Booter V1
Yah-Mart Customer Service V2
Samad Khan Booter V2
Mini Error Booter
Reapers Warrior Boot
Prixi YM Crasher Boot
Sharp Custom Packet Booter
Yahoo Pyre V2
FX Yazak DC V.1.0 special for yazak
Vampiro's Client Killer
Smart Y!Chat Basher 2.5
D3ath Zone Resurrection
Strange The Hunter Boot
E C T Lite V 1.0
The Samad Khan Booter V3
Final Alert V1.04 boot
D O Y Error v.1
HITMAN v.1
Y-kingz The Masscre
Over Flow
Pinks Bubblicious Bomber
Blame It Boot
9 Mill Booter
CrackThats's Destroy All Messengers V1
The Evil War 2.0
Pantera Attack
Dragonz World Smasher
EX VII Free Edition
Beyond s Blaster V1.0
Y Lions Roar Booter
Viprasys Y!Blot Out
New World Order Boot
Hackahoo Lagg a Fag v2.3
T3chnolo9y - K1ll3r V.1 boot
Exploited Messy Dc By Satma
Yah Mart Customer Service 3 Beta
Xtreme 1 Second Dc
Filthy Assasin
1 Bot Ownage
Yah Mart Customer Service 353
Crack Thats Destroy All Messengers v 3.0
FX Messy DC V.2.5
1 Bullet Barney
Road To Hell
D3ad 0r aLiv3
YIC One Boot Error
Add the Clownz
NWO H20 Boot
Nikki s Panty Dropper Exploit
Kick It V1
EX1R Hard Boot
One Bot DC
Black Magic
Fear OF The D4Rk
YMCS Client Lagg
Godfather 1.0
YMCS Kill
Vipra Silent.Tears
Phenom Yahoo Messy DC
Evil DC v.1
Viprsays - Exploit
Yah-Mart Shoplifter Buster V2
Fighter Exploit Boot
Yahelite Flooder
Vista YMCS SLB V3
Tampias Exploit Nusantara Chat:15
Client Silent Flooder
Pure Evil By Dizzle
MOAB Free Version
SSL Phenom Error
Oxid_By___FloXieds__
Kolor-Ijo
Elite Freeze
Zombiekill
Dark Exploit Boot V1
Yah-Mart Shoplifter Buster
Woot Woot Booter
1 Bot By Bhong
Clinton's Booter
Sexy Boot
NiNja
Client KiLL3r
Black And Blue 2.0
Dead Room
Maker Inc - Room Exploit
Room Demolition Ver 4.1
Terror Begin
Booter In Flames
YF - Room Scroller Pro V1.2
Add The Clownz
GP Exploit
One Bot Kill Exploit 9.0
UnHuman Booter
You PWNED Booter
Good Bye Samad-Khan
Fighter Room Freezer
War Of The Boot
Phenom Queen By Dj Indri
Glitters Bug Revenge
Fuck Y!Messy
Purple Widow Return By Black_Dwarf_
JGC12 2 remember
Coringa Boot Destroy
Algeria Menace Booter
You PWNED V2
Y4h Error Automatic
Lethal Weapon By Dizzle
Room Domination 9.0
C Freeze
YMCS 500 NSE VISTA
Phenom killer
Y-Z Exploit Booter
Gold Dust
The Mob
Buddy Hell
Insane DC
Wap/Deny Add Kller
No Mercy
Nikki's Im/Pm Hell (YMCS) NSE-600-XP-13
Gamers Bomb
Merry Xmas Multi Login Booter
Kick Yahoo!
Yah Bomber
Da Chronic v3.5 Software
Yah Fun Lamer Killer
Elite Disconnect
Novin Security Lamer Desortion
Chaotic Viper V1.0 Software
Viprasys Flooder
Room Security
Ilokano Room Flooder
X-Mass Booter V.1
YouPwned-V5 (YMCS-623)
List DC
YIM Nightmare V.1
Lamer Abduction
Voodo Dc Software
Quick Bomber v1
MYF Series Johnny Storm
Amizade:1 Destroy V1.0 Software
Lagg Booter V4.0 Software
Scorpion owns Black Bomber V1.0
Yahoo Msg Explorer V1.0
KiLLa Dc Software
Boot Addicted Software
Phenom-bang Software
Terror Software
Y! Messenger Exploition Software
YahRock Software
Je Te Boot V1.0 Software
Proto Bomb Software
Pink Blaster Software
YouPWNED V6.5 (YMCS-623)
Boot A Bitch Software Boot
Uber Booter (MKII) Software
You Got Pwned V7.0 (YMCS-650)
Exploit Client Software
Teckel DC Software
Super Fun Happy Time Booter By Jammer
F***k Lamer v1
Malay Booter
Forbidden Frost
Yah-Fun Gazza Booter Software
Phenom The Power Of Love
KosOmak V1.0 Software
FX Messy DC Software
Godfather-Phenom Software
World-own Software
Hard Boot V1.0 Software
Chaotic's Denial Software
Y-Hell & EX1R LOL DC
Error Yahoo Messenger 9.0.0.2123 Exploit
Fighter Multi Login Booter Ver.2.5
S41nts Add Bomber
Lamer Flood Software
BD-DC Software
Y! Messenger Exploition V2.0
PopCorn Software booter
SherYjutt Is In Love Software Booter
Fast DC Software Booter
Dragonz Attack Software Boot
Dragonz Attack V2 Software Boot
Yahoo Lucifer Software
Phenom Murder Software Booter
Teckel Boom V2 Software Booter
Alive Software Booter
BD Voice Fast DC Tool
Sxleton Warror™ Crash Tool
À€5À€ Tool
Dark Soft Bomber V1.0 tool
OBB Single Bot Booter Tool
Lawin -Inc Hard Hitter V2 Tools
Marichal booteur10 The Best Tool
Add boot Tool
1 Bot Cryptoz Tool
Zalim Network V8 Tool
Underworld Version 2 Tool
Fast Result Tool
30.000 Destroyer Packet v3 Tool Booter
Mobile Madness Tool Booter
Phenom Valentine's Tool Booter
Y!m Killa Tool Booter
Marcus Messy Annoyer Tool Booter
End Of Life Tool
Fearless-inc V.1 Tool
Y!Booter Pro Tool
Princess-Rares Tool
Diancox B.V.1 Tool Booter
Disaster Dc Tool Booter
Take Em Out Tool Booter
Pop Corn
Tijolo V1.0 Tool Booter
Ym Room List Dc 2
YLC Return V.1 Tool Booter
Yah Fun 1 Bot
Danger Oli Mother Fckr Tool Booter
Yahoo Masterz ASCI Booter
YLC Return V2 Tool Booter
Masterz TM Booter
Old School Boot
Boot Team Account Destroyer V1
Alex Silent Killer Booter
Tiny packet Booter
Fearless-Inc V.4 Booter
Samad Khan V4.0 Booter
The Violator Booter
Yahoo-Load Client Hitter V- 2
Desi Lag Software
Yah-Fun Messy Killer
Tornedo Software
Finish Him Software
Killer Victim V1.0
Dragon Skull Basic3
Y!PM Lagger
Double Shot Software
Pepsi Exploit
Dure Geya Mor Software
Sahil The Mother fckr
Y! Messenger Exploition V2.0
The Pain
Sonic Boom
R.I.P. Y V 3
The Changcuters ( SSL Login Booter )
Erotic
1 DC Error
EliteYahoo n00b b00t
Black Shoot
VNP - Fast Kller V.4
__MoN7aReF__(Dragonz)
Multi Dc
2009 Evil Easter V1
Kingstaa v1
MnT Pirate Smacker Updated Trial Version
Yahmem Ex Kicker
Avoid Version 1.0
Machin Man
Conference Booter V2.0
Yahoo Shakespeare
Rebel
Noob Kller II
After Shock Updated
Silent Death
Fuck Yahoo
Tiny Packet Booter V2
Carney Charger
Grave Digger
YM Blackout
Khiladi Chutia Gand by Baap
Y-killer
Ethel + Varon Booter
Tenz Anne SBooter
Israel
Yahoo Terror Strike
E-C Y!Bomber
Y! Destruction Free Version
Avoid V.5
Raavanan 1 Boot DC
New Badz Booter
Yahoo Terror Strike V.3 Final
Client Cast
Newbadz Booter V.2
Y-3xploit3d-Evolution
3rror By sh0rt_3rror
The Lagging Machine V2
Newbadz Booter V.3
Madz Hard Dc
Others Boot >>>>

Others

Free E-Books

Apache
Beginning PHP5, Apache, and MySQL® Web Development
Apache HTTP Server Configuration
Professional LAMP
The Definitive Guide to Apache mod_rewrite
Architecture
Outstanding Wood Buildings
C#
Acclerated C# 2008
English
English Vocabulary in Use upper intermediate & advanced
English Vocabulary in Use pre-intermediate & intermediate Stuart Redman
English Vocabulary in Use elementary
Goof Proof Spelling
Grammar Essentials
Goof Proof Grammar
The A to Z of Correct English
Hack
Hack Attacks Revealed
Html
The Essential Guide to CSS and HTML Web Design
HTML Css in Pictures
Beginning HTML with CSS and XHTML
HTML, DHTML and JavaScript
HTML 4 for Dummies
Java
Professional Hibernate
Core Servlets and JavaServer Pages
JavaScript
JavaFX™ Script
The Book of JavaScript 2nd Edition
Making Use of JavaScript
JavaScript Programming For the Absolut Beginner
Simply JavaScript
Pro JavaScript Techniques
Linux
Professional LAMP
LINUX System Programming
MatLab
Introduction to Simulink® with Engineering Applications
Oracle
Oracle Database 10g PL/SQL Programming
Migrating Forms Applications from Forms 6i
Oracle9i: Advanced SQL
Advanced SQL Functions in Oracle 10g
Expert Oracle Database 10g Administration
Expert Oracle Database Architecture
Oracle Database 11g PL/SQL Programming
Pascal
Turbo Pascal 5.5 Object Oriented Programming Guide
Object Pascal Language Guide
PHP
Beginning PHP5, Apache, and MySQL® Web Development
SQL
Beginning PHP5, Apache, and MySQL® Web Development
Professional Hibernate
Professional LAMP
Beginning SQL
Microsoft® SQL Server™ 2005 Developer’s Guide
Oracle Database 10g PL/SQL Programming
Advanced SQL Functions in Oracle 10g
Professional SQL Server 2000 Database Design
Microsoft SQL Server 2005 for Dummies
Story
Alice's Adventures in Wonderland
Visual Basic
Visual Basic 6
Visual Basic for Applications Programming Excel
Learn Visual Basic 6.0
Database Access with Visual Basic Jeffrey Mcmanus
Visual Basic 6 Black Book
Web
Beginning PHP5, Apache, and MySQL® Web Development
Wireless
Certified Wireless Network Administrator
Certified Wireless Security Professional
Others E-Books>>>>>>>