Trinoo: Difference between revisions
Sam Sailor (talk | contribs) m Reverted 2 edits by 69.55.251.70 identified as test/vandalism using STiki |
|||
Line 45: | Line 45: | ||
===Step 2=== |
===Step 2=== |
||
As soon as the list of machines that can be compromised has been compiled, scripts are run to compromise them and convert them into the Trinoo Masters or Daemons. One Master can control multiple Daemons. The Daemons are the compromised hosts that launch the actual [[ |
As soon as the list of machines that can be compromised has been compiled, scripts are run to compromise them and convert them into the Trinoo Masters or Daemons. One Master can control multiple Daemons. The Daemons are the compromised hosts that launch the actual [[UPD flood attack|UDP floods]] against the victim machine. |
||
===Step 3=== |
===Step 3=== |
Revision as of 06:04, 23 January 2014
Trinoo | |
---|---|
Type | Botnet |
Technical details | |
Platform | Linux, Solaris |
Size | 13.6kb |
Written in | C |
The trinoo or trin00 is a set of computer programs to conduct a DDoS attack. It is believed that trinoo networks has been set up on thousands of systems on the Internet that have been compromised by remote buffer overrun exploits.[1]
First suspected trinoo attacks are described in CERT Incident Note 99-04. A trinoo network has been connected to the February 2000 distributed denial of service attack on the Yahoo! website.[2]
Trinoo is famous for allowing attackers to leave a message in a folder called cry_baby. The file is self replicating and is modified on a regular basis as long as port 80 is active.
Using Trinoo
Step 1
The attacker, using a compromised host, compiles a list of machines that can be compromised. Most of this process is done automatically from the compromised host, because the host stores a mount of information including how to find other hosts to compromise.
Step 2
As soon as the list of machines that can be compromised has been compiled, scripts are run to compromise them and convert them into the Trinoo Masters or Daemons. One Master can control multiple Daemons. The Daemons are the compromised hosts that launch the actual UDP floods against the victim machine.
Step 3
The DDoS attack is launched when the attacker issues a command on the Master hosts. The Masters instruct every Daemon to start a DoS attack against the IP address specified in the command, many DoSs comprise the DDoS attack.
References
- ^ http://staff.washington.edu/dittrich/misc/trinoo.analysis
- ^
Sinrod, Eric J. (May 2000). "Cyber Crimes: A Practical Approach to the Application of Federal Computer Crime Laws" (PDF 235 KB). Santa Clara Computer and High Technology Law Journal. 16 (2). California: Santa Clara University School of Law: 17. ISSN 0882-3383. Retrieved 2008-11-04.
{{cite journal}}
: Unknown parameter|coauthors=
ignored (|author=
suggested) (help)
External links
- Trinoo description by Symantec
- Trinoo Analysis by David Dittrich
- Trinoo source code