{"id":2078,"date":"2009-10-16T09:45:53","date_gmt":"2009-10-16T09:45:53","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=2078"},"modified":"2015-09-09T19:37:52","modified_gmt":"2015-09-09T11:37:52","slug":"naptha-tcp-state-exhaustion-vulnerability-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/10\/naptha-tcp-state-exhaustion-vulnerability-tool\/","title":{"rendered":"Naptha – TCP State Exhaustion Vulnerability & Tool"},"content":{"rendered":"

[ad]<\/p>\n

The Naptha vulnerabilities are a type of denial-of-service vulnerabilities researched and documented by Bob Keyes of BindView’s RAZOR Security Team in 2000. The vulnerabilities exist in some implementations of the TCP protocol, specifically in the way some TCP implementations keep track of the state of TCP connections, and allow an attacker to exhaust the resources of a system under attack without utilizing much resources on the system used to launch the attack.<\/p>\n

The following links provide more information about the Naptha denial-of-service vulnerabilities:<\/p>\n