

More often than not there is no point in crashing your machine locally while you are logged on to it. It is worth mentioning that although it is possible to perform a DoS attack as a local user, in most cases such attacks are performed remotely. More complicated applications usually mean more bugs and design/implementation flaws which can be exploited by an attacker. On the other hand, we tend to run more and more complicated network applications. The mechanismĭenial of Service (DoS) attacks are based on a very simple assumption that every system has limited resources. This fact also made it easy to port tools like trinoo to the Win32 platform. Due to the widely available source codes of these tools, we can assume the existence of many 'private' versions which have never been used in the wild.

Like with viruses, the first versions of these tools were relatively simple – we had to wait a few months to see something more advanced, like TFN2000.

This is the case with Distributed Denial of Service tools. ( This article was first published in Virus Bulletin, September 2000.) IntroductionĮvery once in a while we see a 'new technology' emerging which turns out to be nothing more than a bunch of old ideas in new packaging.
