- 论坛徽章:
- 0
|
原帖由 南野秀一 于 2007-8-20 00:54 发表 ![]()
有个网吧,只有5MB的出口,被一两百MB的带宽打得不行了,通过电信的朋友找到我,攻击是解决了(自己表扬一个,这次是解决了底出口带宽被堵的问题),现在用户出花红让我找对方的攻击来源.抓到了让对方断手断脚.攻击 ...
通过终端逆路由而上还是比较困难的, 尤其是没有isp协助.
'''
To judge botnet or IP spoofing, you can look at the TTL of every IP packets. If all packets' TTL ar all the same in one period of time, it is likely to be a attack with source IP spoofing.
And check two IP packets with one or two hours interval, check the TTL, if these two TTLs are the same, this case is likely to be a botnet attacking.
But in bose cases, you can not find out the distance between the attacker and the attackee.
'''
从一本书上抄的
前些日子我自己重现了一种 简陋带宽攻击原型, icmp-echo flood with random TTL, random SEQ, random source IP
![]()
souce code http://www.shangxinren.org/src/icmp-echo-flood.tar.gz
lz可以参考下。
[ 本帖最后由 cfk 于 2007-8-21 23:04 编辑 ] |
|