Svoboda | Graniru | BBC Russia | Golosameriki | Facebook

To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Trinoo
TypeBotnet
Operating system(s) affectedLinux, Solaris
Filesize13.6kb
Written inC

The trinoo or trin00 is a set of computer programs to conduct a DDoS attack. It is believed that trinoo networks have been set up on thousands of systems on the Internet that have been compromised by remote buffer overrun exploits.[1]

The first suspected trinoo attacks are described in CERT Incident Note 99–04.[2] A trinoo network has been connected to the February 2000 distributed denial of service attack on the Yahoo! website.[3]

Trinoo is famous for allowing attackers to leave a message in a folder called cry_baby. The file is self replicating and is modified on a regular basis as long as port 80 is active.

Trinoo was authored by a teenager from New Orleans who went by the alias phifli.

YouTube Encyclopedic

  • 1/3
    Views:
    143 475
    16 675
    12 237
  • ¿ES DIOS TRINO? EL PADRE NUESTRO ESCUDRIÑADO (DARIO SALAS)
  • DIOS TRINO (En el nombre del Padre...)
  • 32-El trino HD

Transcription

Using Trinoo

Step 1

The attacker, using a compromised host, compiles a list of machines that can be compromised. Most of this process is done automatically from the compromised host, because the host stores a mount of information including how to find other hosts to compromise.

Step 2

As soon as the list of machines that can be compromised has been compiled, scripts are run to compromise them and convert them into the Trinoo Masters or Daemons. One Master can control multiple Daemons. The Daemons are the compromised hosts that launch the actual UDP floods against the victim machine.

Step 3

The DDoS attack is launched when the attacker issues a command on the Master hosts. The Masters instruct every Daemon to start a DoS attack against the IP address specified in the command, many DoSs comprise the DDoS attack.

See also

References

  1. ^ "Archived copy". Archived from the original on 2006-08-07. Retrieved 2006-07-29.{{cite web}}: CS1 maint: archived copy as title (link)
  2. ^ "CERT® Incident Note IN-99-04". CERT. April 1999. Archived from the original on October 16, 2009. Retrieved July 27, 2014.
  3. ^ Sinrod, Eric J.; William P. Reilly (May 2000). "Cyber Crimes: A Practical Approach to the Application of Federal Computer Crime Laws" (PDF 235 KB). Santa Clara Computer and High Technology Law Journal. 16 (2). California: Santa Clara University School of Law: 17. ISSN 0882-3383. Retrieved 2008-11-04.

External links


This page was last edited on 24 July 2022, at 11:34
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.