What Are DDoS Tools?
Clog victim’s network.
Use many sources (“daemons”) for attacking traffic.
Use “master” machines to control the daemon attackers.
At least 4 different versions in use: TFN, TFN2K, Trinoo, Stacheldraht.
Previous slide
Next slide
Back to first slide
View graphic version