Denial of Service contents.gifindex.gif

Denial of Service

Configures the denial of service attack scans.

Caution: Denial of service attacks can render scanned hosts inoperable. Be careful when running these tests, and be sure that the users and administrators are properly advised before beginning a scan.

UDP Bomb (SunOS): Sends an improperly formed UDP packet, which will cause a kernel panic (reboot) on certain versions of SunOS. See UDP Bomb .

Finger Bomb: Attempts to cause finger to recurse upon itself. See Finger Bomb.

Linux Inetd: A stealth scan can cause Linuxs inetd to fail. If this setting is off, a delay is inserted in the stealth scan. Inetd failure will result in loss of most network services.

Echo and Chargen Check: Tests whether chargen can be spoofed to respond to the echo port. See Echo, Chargen, Time, and Daytime Services.

SYN Storm: Tests for vulnerability to a SYN flood attack. See SYN Storm.

SYN Storm Port: Sets the port to be SYN flooded.

SYN Storm Duration: Sets the duration of the SYN flood.

Data Flood: Attempts to shut down a service by sending a large amount of data. See Data Flood.

Data Flood Port: Sets the port to be data flooded.

Data Flood Duration: Sets the duration of the data flood.

Open Close: Attempts to shut down a service by opening and closing connections rapidly. See Open/Close Flood

Open Close Port: Sets the port for the Open Close test.

Open Close Duration: Sets the duration of the Open Close test.

Log Flood: Attempts to fill the hard drive of the scanned host by writing to the system log. This attack can cause a reduction of service due to saturation of the hard disk subsystem. See System Log Flood.

Log Flood Duration: Sets the duration of the log flood.