Vulnerability Development mailing list archives

Re: BackOrifice == DDoS Server???


From: o'neil.brooke () LMCO COM (Brooke, O'Neil)
Date: Wed, 5 Jul 2000 10:29:07 -0400


-----Original Message-----
From:  Maxime Rousseau [SMTP:mrousseau () LABCAL COM]
Sent:  Thursday, June 29, 2000 10:30 AM
To:    VULN-DEV () SECURITYFOCUS COM
Subject:       Re: BackOrifice == DDoS Server???

<snip>
I would also like to point out that, even if this tool can be used at a
DDoS tool, so can SMS or PC-Anywhere. The fact that all of those were
not primarly intended to be DDoS tools makes it inconvenient to use them
in such fashion. Its like trying to nail something with a screwdriver.
If you have a BO2K owned machine your smart move would be to deploy a
specific DDoS tool on it via the BO2K (kickass) options. It wouldnt be
very easy to synch a large scale DDoS via a net of BO2K machines.

Its all about using the right tool :)

M.

Maxime just hit the nail on the head with that comment. The danger of bo2k
and other trojans is not in their ability to launch a DDOS attack. The danger
lies in how easy it is to setup a large network of trojan infected hosts. The
trojan can then be used to evaluate infected machines and their local network
segments for suitability as a DDOS attack platform.

I wonder if the antivirus companies would be able to track the various trojan
strains. It would be interesting to see how many computers are infected and
can be access by the same password.


Current thread: