
Denial of Service
Configures the denial of service attack scans.
Caution: Denial of service attacks can render scanned hosts inoperable. Be careful
when running these tests, and be sure that the users and administrators are
properly advised before beginning a scan.
UDP Bomb (SunOS): Sends an improperly formed UDP packet, which will cause a kernel panic
(reboot) on certain versions of SunOS. See
Finger Bomb: Attempts to cause finger to recurse upon itself. See
Linux Inetd: A stealth scan can cause Linux
Echo and Chargen Check: Tests whether chargen can be spoofed to respond to the echo port. See
SYN Storm: Tests for vulnerability to a SYN flood attack. See
SYN Storm Port: Sets the port to be SYN flooded.
SYN Storm Duration: Sets the duration of the SYN flood.
Data Flood: Attempts to shut down a service by sending a large amount of data. See
Data Flood Port: Sets the port to be data flooded.
Data Flood Duration: Sets the duration of the data flood.
Open Close: Attempts to shut down a service by opening and closing connections rapidly.
See
Open Close Port: Sets the port for the Open Close test.
Open Close Duration: Sets the duration of the Open Close test.
Log Flood: Attempts to fill the hard drive of the scanned host by writing to the system
log. This attack can cause a reduction of service due to saturation of the
hard disk subsystem. See
Log Flood Duration: Sets the duration of the log flood.