[732] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

c4i-pro Denial-of-service at panix

daemon@ATHENA.MIT.EDU (Fence-Walker(UNCL Miya))
Mon Sep 16 04:42:25 1996

Date: Fri, 13 Sep 1996 12:16:24 -0700
To: ids@uow.edu.au
From: "Fence-Walker(UNCL Miya)" <uncl@llnl.gov>
Reply-To: ids@uow.edu.au

Forwarded as a matter of interest.
frank
&&&&&&&&&&&&
X-Authentication-Warning: azure.stl.nps.navy.mil: majordom set sender to owner-c
4i-pro@stl.nps.navy.mil using -f
From: Don McGregor <mcgredo@stl.nps.navy.mil>
Subject: c4i-pro Denial-of-service at panix
[...]

Don McGregor <mcgredo@stl.nps.navy.mil>

It seems that panix, a New York internet service provider, is undergoing
a denial-of service attack.

The writeup for the masses is at

http://www.washingtonpost.com/wp-srv/WPlate/1996-09/12/156L-091296-idx.html

The technical details are at

http://www.fc.net/phrack/files/p48/p48-14.html

The attack described in the phrack article is actually much more
sophisticated than that apparently used by the panix attacker.
The panix guy is apparently only using the denial-of-service
portion, rather than the full-on IP spoofing approach described
by daemon9, of which denial-of-service is one part.


frank swift (510) 422-1463 uncl@llnl.gov (510) 423-0913 fax
Key fingerprint =  1A 14 02 5A 76 B2 BD 47  C0 3E ED 9A C5 3B 81 2D

home help back first fref pref prev next nref lref last post