Using UDP for denial-of-service attacks is not as straightforward as
with the Transmission Control Protocol (TCP). However, a UDP flood
attack can be initiated by sending a large number of UDP packets to
random ports on a remote host. As a result, the distant host will:
- Check for the application listening at that port;
- See that no application listens at that port;
- Reply with an ICMP Destination Unreachable packet.
Thus, for a large number of UDP packets, the victimized system will be
forced into sending many ICMP packets, eventually leading it to be
unreachable by other clients. The attacker may alsospoof the IP
address of the UDP packets, ensuring that the excessive ICMP return
packets do not reach him, and anonymizing the attacker's network
location(s).
Version: 1.5
What's new:
-> Now it can takes parameters!
Usage:UDP_Flooder.exe -t (Target) -p (PacketData)
Example:UDP_Flooder.exe -t www.blind-security.blogspot.com -p uf87lop
-> Fixed and now will never display anything that may reveal it to victim
Screenshots:
No comments:
Post a Comment