Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Smurf attack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== The original tool for creating a Smurf attack was written by Dan Moschuk (alias TFreak) in 1997.<ref>{{cite web|url=http://hackepedia.org/?title=Tfreak |title=Tfreak |publisher=Hackepedia |date=2013-03-28 |accessdate=2019-11-13}}</ref><ref>{{Cite web |last=Pramatarov |first=Martin |date=2021-09-09 |title=What is a Smurf DDoS attack? |url=https://www.cloudns.net/blog/what-is-smurf-ddos-attack/ |access-date=2022-09-15 |website=ClouDNS Blog |language=en-US}}</ref> In the late 1990s, many IP networks would participate in Smurf attacks if prompted (that is, they would respond to ICMP requests sent to broadcast addresses). The name comes from the idea of very small, but numerous attackers overwhelming a much larger opponent (see [[Smurfs]]). Today, administrators can make a network immune to such abuse; therefore, very few networks remain vulnerable to Smurf attacks.<ref>For example, [https://web.archive.org/web/19990125091051/http://www.netscan.org/ netscan.org (Web Archive)] showed 122,945 broken networks as of Jan 25, 1999, but only 2,417 as of Jan 06, 2005.</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)