Methods of distributed denial of service attacks (cont.)
- Stacheldraht: implements Smurf, SYN Flood, UDP Flood, and ICMP Flood attacks.
- Shaft: A distinctive feature of Shaft is the ability to switch control master servers and ports in real time, hence making detection by intrusion detection tools difficult.
- TFN2K: uses TCP, UDP, ICMP, or all three to communicate between the control master program and the attack daemons.