Jump to content

IRC flood: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Bluelink 4 books for verifiability (prndis)) #IABot (v2.0) (GreenC bot
 
(5 intermediate revisions by 5 users not shown)
Line 1: Line 1:
{{Cleanup rewrite|date=January 2012}}
{{Cleanup rewrite|date=January 2012}}
'''Flooding''' or '''scrolling''' on an [[Internet Relay Chat|IRC]] network is a method of disconnecting users from an IRC server (a form of [[Denial of Service]]), exhausting bandwidth which causes network latency ('[[lag]]'), or just disrupting users. Floods can either be done by scripts (written for a given client) or by external programs.
'''Internet Relay Chat Flooding/Scrolling''' on an [[Internet Relay Chat|IRC]] network is a method of disconnecting users from an IRC server (a form of [[Denial of Service]]), exhausting bandwidth which causes network latency ('[[Latency (engineering)|lag]]'), or just disrupting users. Floods can either be done by scripts (written for a given client) or by external programs.


==History==
==History==
Line 56: Line 56:
|last = Pioch
|last = Pioch
|first = Nicolas
|first = Nicolas
|authorlink =
|date = 1993-02-28
|date = 1993-02-28
|url-status = dead
|archive-url = https://web.archive.org/web/20090814234709/http://irc.carnet.hr/docs/docs/primer.txt
|archive-url = https://web.archive.org/web/20090814234709/http://irc.carnet.hr/docs/docs/primer.txt
|archive-date = 2009-08-14
|archive-date = 2009-08-14
|df =
}}
}}
* {{cite web
* {{cite web
Line 67: Line 64:
|title = Logging and Reporting IRC Abuses
|title = Logging and Reporting IRC Abuses
|access-date = 2009-05-25
|access-date = 2009-05-25
|url-status = dead
|archive-url = https://web.archive.org/web/20090815124832/http://irc.carnet.hr/docs/docs/abuse.txt
|archive-url = https://web.archive.org/web/20090815124832/http://irc.carnet.hr/docs/docs/abuse.txt
|archive-date = 2009-08-15
|archive-date = 2009-08-15
|df =
}}
}}
* {{cite web
* {{cite web
Line 78: Line 73:
|last = Brinton
|last = Brinton
|first = Aaron
|first = Aaron
|authorlink =
|date = August 1997
|date = August 1997
|url-status = dead
|archive-url = https://web.archive.org/web/20090814234703/http://irc.carnet.hr/docs/docs/opersguide.txt
|archive-url = https://web.archive.org/web/20090814234703/http://irc.carnet.hr/docs/docs/opersguide.txt
|archive-date = 2009-08-14
|archive-date = 2009-08-14
|df =
}}
}}
* {{cite web
* {{cite web
Line 91: Line 83:
|last = Powers
|last = Powers
|first = Ray
|first = Ray
|authorlink =
|date = 1998-07-30
|date = 1998-07-30
|url-status = dead
|archive-url = https://web.archive.org/web/20090815124846/http://irc.carnet.hr/docs/docs/opermyth.txt
|archive-url = https://web.archive.org/web/20090815124846/http://irc.carnet.hr/docs/docs/opermyth.txt
|archive-date = 2009-08-15
|archive-date = 2009-08-15
|df =
}}
}}
* {{cite journal
* {{cite ietf
| last = Reed
| last = Reed
| first = Darren
| first = Darren
| authorlink =
|date=May 1992
|date=May 1992
| title = A Discussion on Computer Network Conferencing: 5.2.6 Network Friendliness
| title = A Discussion on Computer Network Conferencing: 5.2.6 Network Friendliness
Line 107: Line 95:
| publisher = [[Internet Engineering Task Force|IETF]]
| publisher = [[Internet Engineering Task Force|IETF]]
| url = http://tools.ietf.org/html/rfc1324#section-5.2.6
| url = http://tools.ietf.org/html/rfc1324#section-5.2.6
| accessdate = 2009-05-25
| access-date = 2009-05-25
}}
}}
* {{cite journal
* {{cite ietf
| last = Oikarinen
| last = Oikarinen
| first = Jarkko
| first = Jarkko
| authorlink = Jarkko Oikarinen
| author-link = Jarkko Oikarinen
|author2=Reed, Darren
|author2=Reed, Darren
|date=May 1993
|date=May 1993
Line 119: Line 107:
| publisher = [[Internet Engineering Task Force|IETF]]
| publisher = [[Internet Engineering Task Force|IETF]]
| url = http://tools.ietf.org/html/rfc1459#section-8.10
| url = http://tools.ietf.org/html/rfc1459#section-8.10
| accessdate = 2009-05-25
| access-date = 2009-05-25
}}
}}
* {{cite journal
* {{cite ietf
| last = Kalt
| last = Kalt
| first = Christophe
| first = Christophe
| authorlink =
|date=April 2000
|date=April 2000
| title = Internet Relay Chat: Server Protocol: 5.8 Flood control of clients
| title = Internet Relay Chat: Server Protocol: 5.8 Flood control of clients
Line 130: Line 117:
| publisher = [[Internet Engineering Task Force|IETF]]
| publisher = [[Internet Engineering Task Force|IETF]]
| url = http://tools.ietf.org/html/rfc2813#section-5.8
| url = http://tools.ietf.org/html/rfc2813#section-5.8
| accessdate = 2009-05-25
| access-date = 2009-05-25
}}
}}
* {{cite book
* {{cite book
| last = Mutton
| last = Mutton
| first = Paul
| first = Paul
| authorlink =
| title = IRC Hacks
| title = IRC Hacks
| edition = 1st
| edition = 1st
Line 146: Line 132:
* {{cite book |last = Grimes
* {{cite book |last = Grimes
|first = Roger A.
|first = Roger A.
|authorlink =
|title = Malicious Mobile Code: Virus Protection for Windows
|title = Malicious Mobile Code: Virus Protection for Windows
|date = August 2001
|date = August 2001
Line 157: Line 142:
* {{cite book
* {{cite book
| last = (anonymous)
| last = (anonymous)
| first =
| authorlink =
| title = Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
| title = Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
| date = June 1997
| date = June 1997
| publisher = [[SAMS Publishing]]
| publisher = [[SAMS Publishing]]
| location =
| isbn = 1-57521-268-4
| isbn = 1-57521-268-4
| pages = [https://archive.org/details/maximumsecurityh00anon/page/140 140–141]
| pages = [https://archive.org/details/maximumsecurityh00anon/page/140 140–141]
Line 170: Line 152:
| last = Crystal
| last = Crystal
| first = David
| first = David
| authorlink =
| title = Language and the Internet
| title = Language and the Internet
| url = https://archive.org/details/languageinternet00crys_700
| url = https://archive.org/details/languageinternet00crys_700
Line 177: Line 158:
| date = 2006-09-18
| date = 2006-09-18
| publisher = [[Cambridge University Press]]
| publisher = [[Cambridge University Press]]
| location =
| isbn = 0-521-86859-9
| isbn = 0-521-86859-9
| page = [https://archive.org/details/languageinternet00crys_700/page/n173 160]
| page = [https://archive.org/details/languageinternet00crys_700/page/n173 160]
Line 183: Line 163:
* {{cite book |last = Rheingold
* {{cite book |last = Rheingold
|first = Howard
|first = Howard
|authorlink =
|title = The Virtual Community: Homesteading on the Electronic Frontier
|title = The Virtual Community: Homesteading on the Electronic Frontier
|edition = 1st
|edition = 1st
|date = October 1993
|date = October 1993
|publisher = [[Basic Books]]
|publisher = [[Basic Books]]
|location =
|isbn = 0-201-60870-7
|isbn = 0-201-60870-7
|page = [https://archive.org/details/virtualcommunity00rhei/page/185 185]
|page = [https://archive.org/details/virtualcommunity00rhei/page/185 185]
Line 196: Line 174:
| last = Surratt
| last = Surratt
| first = Carla G.
| first = Carla G.
| authorlink =
| title = Netaholics?: The Creation of a Pathology
| title = Netaholics?: The Creation of a Pathology
| date = 1999-08-01
| date = 1999-08-01
Line 207: Line 184:
| editor1-last = Gibbs
| editor1-last = Gibbs
| editor1-first = Donna
| editor1-first = Donna
| editor1-link =
| editor2-last = Krause
| editor2-last = Krause
| editor2-first = Kerri-Lee
| editor2-first = Kerri-Lee
| editor2-link =
| title = Cyberlines 2.0: Languages and Cultures of the Internet
| title = Cyberlines 2.0: Languages and Cultures of the Internet
| edition = 2nd
| edition = 2nd
| date = 2006-06-01
| date = 2006-06-01
| publisher = [[James Nicholas Publishers]]
| publisher = [[James Nicholas Publishers]]
| location =
| isbn = 1-875408-42-8
| isbn = 1-875408-42-8
| pages = 270–271
| pages = 270–271
Line 222: Line 196:
| last1 = Piccard
| last1 = Piccard
| first1 = Paul
| first1 = Paul
| authorlink1 =
| last2 = Baskin
| last2 = Baskin
| first2 = Brian
| first2 = Brian
| authorlink2 =
| last3 = Edwards
| last3 = Edwards
| first3 = Craig
| first3 = Craig
| authorlink3 =
| last4 = Spillman
| last4 = Spillman
| first4 = George
| first4 = George
| authorlink4 =
| editor1-last = Sachs
| editor1-last = Sachs
| editor1-first = Marcus
| editor1-first = Marcus
Line 246: Line 216:
| last1 = McClure
| last1 = McClure
| first1 = Stuart
| first1 = Stuart
| authorlink1 =
| last2 = Scambray
| last2 = Scambray
| first2 = Joel
| first2 = Joel
| authorlink2 =
| last3 = Kurtz
| last3 = Kurtz
| first3 = George
| first3 = George
| authorlink3 =
| title = Hacking Exposed 5th Edition: Network Security Secrets And Solutions
| title = Hacking Exposed 5th Edition: Network Security Secrets And Solutions
| edition = 5th
| edition = 5th
Line 264: Line 231:
| last1 = Scambray
| last1 = Scambray
| first1 = Joel
| first1 = Joel
| authorlink1 =
| last2 = Shema
| last2 = Shema
| first2 = Mike
| first2 = Mike
| authorlink2 =
| last3 = Sima
| last3 = Sima
| first3 = Caleb
| first3 = Caleb
| authorlink3 =
| title = Hacking Exposed: Web Applications
| title = Hacking Exposed: Web Applications
| edition = 2nd
| edition = 2nd
Line 282: Line 246:
| editor1-last = Tipton
| editor1-last = Tipton
| editor1-first = Harold F.
| editor1-first = Harold F.
| editor1-link =
| editor2-last = Krause
| editor2-last = Krause
| editor2-first = Micki
| editor2-first = Micki
| editor2-link =
| title = Information Security Management Handbook
| title = Information Security Management Handbook
| edition = 5th
| edition = 5th
Line 291: Line 253:
| date = 2004-12-28
| date = 2004-12-28
| publisher = [[Auerbach Publications]]
| publisher = [[Auerbach Publications]]
| location =
| isbn = 0-8493-3210-9
| isbn = 0-8493-3210-9
| page = 517
| page = 517
Line 298: Line 259:
| editor1-last = Tipton
| editor1-last = Tipton
| editor1-first = Harold F.
| editor1-first = Harold F.
| editor1-link =
| editor2-last = Krause
| editor2-last = Krause
| editor2-first = Micki
| editor2-first = Micki
| editor2-link =
| title = Information Security Management Handbook
| title = Information Security Management Handbook
| edition = 6th
| edition = 6th
| date = 2007-05-14
| date = 2007-05-14
| publisher = Auerbach Publications
| publisher = Auerbach Publications
| location =
| isbn = 978-0-8493-7495-1
| isbn = 0-8493-7495-2
| author = Harold F. Tipton, Micki Krause.
| author = Harold F. Tipton, Micki Krause.
}}
}}
Line 313: Line 271:
| last = Maynor
| last = Maynor
| first = David
| first = David
| authorlink =
|author2=James, Lance |author3=Spammer-X |author4=Bradley, Tony |author5=Thornton, Frank |author6=Haines, Brad |author7=Baskin, Brian |author8=Bhargava, Hersh |author9=Faircloth, Jeremy |author10=Edwards, Craig |author11=Gregg, Michael |author12=Bandes, Ron |author13=Das, Anand M. |author14=Piccard, Paul
|author2=James, Lance |author3=Spammer-X |author4=Bradley, Tony |author5=Thornton, Frank |author6=Haines, Brad |author7=Baskin, Brian |author8=Bhargava, Hersh |author9=Faircloth, Jeremy |author10=Edwards, Craig |author11=Gregg, Michael |author12=Bandes, Ron |author13=Das, Anand M. |author14=Piccard, Paul
| title = Emerging Threat Analysis: From Mischief to Malicious
| title = Emerging Threat Analysis: From Mischief to Malicious
Line 327: Line 284:
| last = Bidgoli
| last = Bidgoli
| first = Hossein
| first = Hossein
| authorlink =
| title = The Internet Encyclopedia
| title = The Internet Encyclopedia
| url = https://archive.org/details/internetencyclop00bidg
| url = https://archive.org/details/internetencyclop00bidg
Line 341: Line 297:
| last1 = Northcutt
| last1 = Northcutt
| first1 = Stephen
| first1 = Stephen
| authorlink1 =
| last2 = Novak
| last2 = Novak
| first2 = Judy
| first2 = Judy
| authorlink2 =
| title = Network Intrusion Detection
| title = Network Intrusion Detection
| edition = 3rd
| edition = 3rd
| date = 2002-09-06
| date = 2002-09-06
| publisher = [[SAMS Publishing]]
| publisher = [[SAMS Publishing]]
| location =
| isbn = 0-7357-1265-4
| isbn = 0-7357-1265-4
}}
}}
* {{cite book |last1 = Douligeris
* {{cite book |last1 = Douligeris
|first1 = Christos
|first1 = Christos
|authorlink1 =
|last2 = Serpanos
|last2 = Serpanos
|first2 = Dimitrios N.
|first2 = Dimitrios N.
|authorlink2 =
|title = Network Security: Current Status and Future Directions
|title = Network Security: Current Status and Future Directions
|date = 2007-06-15
|date = 2007-06-15
|publisher = [[John Wiley & Sons]]
|publisher = [[John Wiley & Sons]]
|location = [[Hoboken, New Jersey]]
|location = [[Hoboken, New Jersey]]
|isbn = 0-471-70355-9
|isbn = 978-0-471-70355-6
|url = https://archive.org/details/networksecurityc00doul
|url = https://archive.org/details/networksecurityc00doul
}}
}}
Line 368: Line 319:
| last1 = Skoudis
| last1 = Skoudis
| first1 = Ed
| first1 = Ed
| authorlink1 =
| last2 = Liston
| last2 = Liston
| first2 = Tom
| first2 = Tom
| authorlink2 =
| title = Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
| title = Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
| edition = 2nd
| edition = 2nd
| date = 2006-01-02
| date = 2006-01-02
| publisher = [[Prentice Hall]]
| publisher = [[Prentice Hall]]
| location =
| isbn = 0-13-148104-5
| isbn = 0-13-148104-5
}}
}}
Line 382: Line 330:
| last1 = King
| last1 = King
| first1 = Todd
| first1 = Todd
| authorlink1 =
| last2 = Tittel
| last2 = Tittel
| first2 = Ed
| first2 = Ed
| authorlink2 =
| last3 = Bittlingmeier
| last3 = Bittlingmeier
| first3 = David
| first3 = David
| authorlink3 =
| title = Security+ Training Guide
| title = Security+ Training Guide
| date = 2003-04-06
| date = 2003-04-06
| publisher = [[Que Publishing]]
| publisher = [[Que Publishing]]
| location =
| isbn = 0-7897-2836-2
| isbn = 0-7897-2836-2
}}
}}
Line 398: Line 342:
| last1 = Baskin
| last1 = Baskin
| first1 = Brian
| first1 = Brian
| authorlink1 =
| last2 = Bradley
| last2 = Bradley
| first2 = Tony
| first2 = Tony
| authorlink2 =
| last3 = Faircloth
| last3 = Faircloth
| first3 = Jeremy
| first3 = Jeremy
| authorlink3 =
| last4 = Schiller
| last4 = Schiller
| first4 = Craig A.
| first4 = Craig A.
| authorlink4 =
| last5 = Caruso
| last5 = Caruso
| first5 = Ken
| first5 = Ken
| authorlink5 =
| last6 = Piccard
| last6 = Piccard
| first6 = Paul
| first6 = Paul
| authorlink6 =
| last7 = James
| last7 = James
| first7 = Lance
| first7 = Lance
| authorlink7 =
| editor1-last = Piltzecker
| editor1-last = Piltzecker
| editor1-first = Tony
| editor1-first = Tony
| editor1-link =
| title = Combating Spyware in the Enterprise
| title = Combating Spyware in the Enterprise
| edition = 1st
| edition = 1st
Line 429: Line 365:
}}
}}
* {{cite book
* {{cite book
| editor1-last = Ho:o:k
| editor1-last = Höök
| editor1-first = Kristina
| editor1-first = Kristina
| editor1-link =
| editor2-last = Benyon
| editor2-last = Benyon
| editor2-first = David
| editor2-first = David
| editor2-link =
| editor3-last = Munro
| editor3-last = Munro
| editor3-first = Alan J.
| editor3-first = Alan J.
| editor3-link =
| title = Designing Information Spaces: The Social Navigation Approach
| title = Designing Information Spaces: The Social Navigation Approach
| edition = 1st
| edition = 1st
Line 449: Line 382:
| last1 = Schiller
| last1 = Schiller
| first1 = Craig A.
| first1 = Craig A.
| authorlink1 =
| last2 = Binkley
| last2 = Binkley
| first2 = Jim
| first2 = Jim
| authorlink2 =
| last3 = Harley
| last3 = Harley
| first3 = David
| first3 = David
| authorlink3 =
| last4 = Evron
| last4 = Evron
| first4 = Gadi
| first4 = Gadi
| authorlink4 =
| last5 = Bradley
| last5 = Bradley
| first5 = Tony
| first5 = Tony
| authorlink5 =
| last6 = Willems
| last6 = Willems
| first6 = Carsten
| first6 = Carsten
| authorlink6 =
| last7 = Cross
| last7 = Cross
| first7 = Michael
| first7 = Michael
| authorlink7 =
| title = Botnets: The Killer Web App
| title = Botnets: The Killer Web App
| url = https://archive.org/details/botnetskillerweb00schi
| url = https://archive.org/details/botnetskillerweb00schi
Line 474: Line 400:
| publisher = Syngress Publishing
| publisher = Syngress Publishing
| location = [[Rockland, Massachusetts]]
| location = [[Rockland, Massachusetts]]
| isbn = 1-59749-135-7
| isbn = 978-1-59749-135-8
| page = [https://archive.org/details/botnetskillerweb00schi/page/n97 80]
| page = [https://archive.org/details/botnetskillerweb00schi/page/n97 80]
}}
}}
Line 485: Line 411:
{{IRC topics}}
{{IRC topics}}


[[Category:Internet Relay Chat|Flood]]
[[Category:IRC|Flood]]

Latest revision as of 05:49, 6 June 2024

Internet Relay Chat Flooding/Scrolling on an IRC network is a method of disconnecting users from an IRC server (a form of Denial of Service), exhausting bandwidth which causes network latency ('lag'), or just disrupting users. Floods can either be done by scripts (written for a given client) or by external programs.

History[edit]

The history of Internet Relay Chat flooding started as a method of taking over an IRC channel from the original founders of the channel. The first attacks generally used a modified IRC client or an application to flood a channel or a user. Later they started to be based on bots and scripts. This later moved on to starting IRC-based botnets which were capable of DDoS and IRC floods.

Types of floods[edit]

A post flood on an IRC channel, repeating the term "OMG" several hundred times

Connect flood[edit]

Connecting and disconnecting from a channel as fast as possible, therefore spamming the channel with dis/connect messages also called q/j flooding.

CTCP flood[edit]

Since CTCP is implemented in almost every client, most users respond to CTCP requests. By sending too many requests, after a couple of answers they get disconnected from the IRC server. The most widely used type is CTCP PING, although some clients also implement other CTCP replies.

DCC flood[edit]

This type consists of initiating many DCC requests simultaneously. Theoretically it can also be used to disconnect users, because the target client sends information back about what port is intended to be used during the DCC session.

ICMP flood[edit]

Typically referred to as a ping flood. This attack overloads the victim's internet connection with an amount of ICMP data exceeding the connection's capacity, potentially causing a disconnection from the IRC network. For the duration of the attack, the user's internet connection remains hindered. Technically speaking, this is not an IRC flood, as the attack itself doesn't traverse the IRC network at all, but operates entirely independent of anything but the raw internet connection and its IP protocol (of which ICMP is a subset). Even so, the actual IP address to flood (the address of the victim's connection) is frequently obtained by looking at the victim's user information (e.g. through the /whois or /dns command) on the IRC network.

Invite flood[edit]

Sending disruptive numbers of invites to a certain channel.

Post flood[edit]

This is the simplest type of IRC flooding. It involves posting large numbers of posts or one very long post with repetitive text. This type of flood can be achieved, for example, by copying and pasting one short word repeatedly.

Example of a message flood using over 50 clones.

Message flood[edit]

Sending massive numbers of private messages to the victim, mainly from different connections called clones (see below). Since some clients separate the private conversations into another window, each new message could open a new window for every new user a message is received from. This is exploitable by sending messages from multiple names, causing the target client to open many new windows and potentially swamping the user with boxes. Sometimes the easiest way to close all the windows is to restart the IRC client, although scripts (client extensions) exist to 'validate' unknown nicknames before receiving messages from them.

Notice flood[edit]

Similar to the message, but uses the "notice" command.

Nick flood[edit]

Changing the nick as fast as possible, thus disrupting conversation in the channel.

See also[edit]

References[edit]

External links[edit]