freebsd-ports/security/zombiezapper/pkg-descr
Jason E. Hale 54a3a5b828 - Update MASTER_SITES
- Remove DEPRECATED/EXPIRATION_DATE as port fetches now
- Use PORTDOCS macro and PLIST_FILES instead of 4 line pkg-plist
- Convert to new options framework
- Trim Makefile header
- Remove dead WWW from pkg-descr
- Rename patch-aa to patch-zz.c

PR:		ports/172065
Submitted by:	KATO Tsuguru <tkato432@yahoo.com>
Approved by:	makc, avilla (mentors, implicit)
Feature safe:	yes
2012-10-26 09:29:39 +00:00

10 lines
618 B
Text

Zombie Zapper works against Trinoo, TFN, and Stacheldraht. Assuming
that the default passwords have not been changed, you can simply use
the same commands that an attacker would use to stop the flood. On
Trinoo, it does stop the daemon entirely (although it is typically
set to be restarted by cron, silently awaiting more commands), but
on TFN and Stacheldraht the flooding just stops. This gives you the
advantage of telling the daemon to stop flooding without stopping
the daemon, allowing you to take a little more time in tracking down
where they are, and more importantly, how they got there in the first
place.