[732] in Intrusion Detection Systems
c4i-pro Denial-of-service at panix
daemon@ATHENA.MIT.EDU (Fence-Walker(UNCL Miya))
Mon Sep 16 04:42:25 1996
Date: Fri, 13 Sep 1996 12:16:24 -0700
To: ids@uow.edu.au
From: "Fence-Walker(UNCL Miya)" <uncl@llnl.gov>
Reply-To: ids@uow.edu.au
Forwarded as a matter of interest.
frank
&&&&&&&&&&&&
X-Authentication-Warning: azure.stl.nps.navy.mil: majordom set sender to owner-c
4i-pro@stl.nps.navy.mil using -f
From: Don McGregor <mcgredo@stl.nps.navy.mil>
Subject: c4i-pro Denial-of-service at panix
[...]
Don McGregor <mcgredo@stl.nps.navy.mil>
It seems that panix, a New York internet service provider, is undergoing
a denial-of service attack.
The writeup for the masses is at
http://www.washingtonpost.com/wp-srv/WPlate/1996-09/12/156L-091296-idx.html
The technical details are at
http://www.fc.net/phrack/files/p48/p48-14.html
The attack described in the phrack article is actually much more
sophisticated than that apparently used by the panix attacker.
The panix guy is apparently only using the denial-of-service
portion, rather than the full-on IP spoofing approach described
by daemon9, of which denial-of-service is one part.
frank swift (510) 422-1463 uncl@llnl.gov (510) 423-0913 fax
Key fingerprint = 1A 14 02 5A 76 B2 BD 47 C0 3E ED 9A C5 3B 81 2D