205:(see below). Since some clients separate the private conversations into another window, each new message could open a new window for every new user a message is received from. This is exploitable by sending messages from multiple names, causing the target client to open many new windows and potentially swamping the user with boxes. Sometimes the easiest way to close all the windows is to restart the IRC client, although scripts (client extensions) exist to 'validate' unknown nicknames before receiving messages from them.
262:
189:
25:
110:
168:
operates entirely independent of anything but the raw internet connection and its IP protocol (of which ICMP is a subset). Even so, the actual IP address to flood (the address of the victim's connection) is frequently obtained by looking at the victim's user information (e.g. through the /whois or /dns command) on the IRC network.
167:
data exceeding the connection's capacity, potentially causing a disconnection from the IRC network. For the duration of the attack, the user's internet connection remains hindered. Technically speaking, this is not an IRC flood, as the attack itself doesn't traverse the IRC network at all, but
138:
is implemented in almost every client, most users respond to CTCP requests. By sending too many requests, after a couple of answers they get disconnected from the IRC server. The most widely used type is CTCP PING, although some clients also implement other CTCP replies.
184:
This is the simplest type of IRC flooding. It involves posting large numbers of posts or one very long post with repetitive text. This type of flood can be achieved, for example, by copying and pasting one short word repeatedly.
843:
Maynor, David; James, Lance; Spammer-X; Bradley, Tony; Thornton, Frank; Haines, Brad; Baskin, Brian; Bhargava, Hersh; Faircloth, Jeremy; Edwards, Craig; Gregg, Michael; Bandes, Ron; Das, Anand M.; Piccard, Paul (November 2006).
93:
an IRC channel from the original founders of the channel. The first attacks generally used a modified IRC client or an application to flood a channel or a user. Later they started to be based on
151:
requests simultaneously. Theoretically it can also be used to disconnect users, because the target client sends information back about what port is intended to be used during the DCC session.
1008:
Baskin, Brian; Bradley, Tony; Faircloth, Jeremy; Schiller, Craig A.; Caruso, Ken; Piccard, Paul; James, Lance (2006-09-19). Piltzecker, Tony (ed.).
126:
Connecting and disconnecting from a channel as fast as possible, therefore spamming the channel with dis/connect messages also called q/j flooding.
1079:
952:
833:
1379:
1128:
1297:
1048:
1021:
998:
975:
923:
900:
865:
814:
791:
764:
737:
706:
683:
656:
627:
596:
567:
534:
305:
283:
164:
1040:
486:
448:
407:
1101:
1058:
Schiller, Craig A.; Binkley, Jim; Harley, David; Evron, Gadi; Bradley, Tony; Willems, Carsten; Cross, Michael (2007-02-15).
361:
381:
81:'), or just disrupting users. Floods can either be done by scripts (written for a given client) or by external programs.
90:
322:
341:
615:
98:
1661:
1236:
1149:
160:
135:
37:
1175:
1121:
783:
756:
698:
276:
270:
1241:
1067:
1013:
853:
725:
675:
148:
287:
729:
806:
188:
78:
1548:
1461:
944:
888:
500:
462:
421:
201:
Sending massive numbers of private messages to the victim, mainly from different connections called
1666:
1614:
1412:
1137:
1114:
940:
884:
857:
671:
619:
70:
1594:
1466:
779:
752:
892:
101:. This later moved on to starting IRC-based botnets which were capable of DDoS and IRC floods.
1609:
1075:
1071:
1044:
1017:
994:
971:
948:
919:
896:
861:
829:
810:
787:
760:
733:
702:
679:
652:
648:
638:
623:
592:
588:
578:
563:
559:
555:
545:
530:
526:
230:
74:
1420:
1389:
490:
452:
438:
411:
1543:
1497:
915:
584:
846:
608:
24:
1682:
1384:
1251:
1165:
990:
824:
Harold F. Tipton, Micki Krause. (2007-05-14). Tipton, Harold F.; Krause, Micki (eds.).
551:
522:
46:
964:
Counter Hack
Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
1715:
1060:
967:
934:
877:
221:
Changing the nick as fast as possible, thus disrupting conversation in the channel.
1721:
1702:
1528:
1210:
1205:
1190:
717:
401:
240:
114:
442:
480:
1573:
1292:
644:
503:
465:
424:
365:
163:
flood. This attack overloads the victim's internet connection with an amount of
580:
Maximum
Security: A Hacker's Guide to Protecting Your Internet Site and Network
1604:
1476:
1363:
1195:
385:
716:
Piccard, Paul; Baskin, Brian; Edwards, Craig; Spillman, George (2005-05-01).
1656:
1589:
1282:
1106:
326:
345:
109:
1538:
1471:
1430:
1327:
1317:
1302:
1277:
1231:
1185:
403:
A Discussion on
Computer Network Conferencing: 5.2.6 Network Friendliness
73:
network is a method of disconnecting users from an IRC server (a form of
1630:
1563:
1558:
1451:
1353:
1348:
1343:
1322:
1170:
1036:
245:
94:
1640:
1599:
1518:
1312:
1287:
1267:
495:
457:
416:
749:
Hacking
Exposed 5th Edition: Network Security Secrets And Solutions
89:
The history of
Internet Relay Chat flooding started as a method of
1687:
1635:
1568:
1553:
1533:
1523:
1513:
1492:
1425:
1307:
1272:
1031:
HΓΆΓΆk, Kristina; Benyon, David; Munro, Alan J., eds. (2003-01-31).
482:
Internet Relay Chat: Server
Protocol: 5.8 Flood control of clients
235:
187:
108:
1456:
1435:
1246:
1226:
1200:
1110:
1358:
640:
The
Virtual Community: Homesteading on the Electronic Frontier
255:
18:
1096:
747:
McClure, Stuart; Scambray, Joel; Kurtz, George (2005-04-19).
1033:
Designing
Information Spaces: The Social Navigation Approach
176:
Sending disruptive numbers of invites to a certain channel.
985:
King, Todd; Tittel, Ed; Bittlingmeier, David (2003-04-06).
933:
Douligeris, Christos; Serpanos, Dimitrios N. (2007-06-15).
444:
Internet Relay Chat
Protocol: 8.10 Flood control of clients
774:
Scambray, Joel; Shema, Mike; Sima, Caleb (2006-06-05).
213:
Similar to the message, but uses the "notice" command.
77:), exhausting bandwidth which causes network latency ('
42:
936:
Network
Security: Current Status and Future Directions
695:
Cyberlines 2.0: Languages and Cultures of the Internet
801:
Tipton, Harold F.; Krause, Micki, eds. (2004-12-28).
848:
Emerging Threat Analysis: From Mischief to Malicious
693:
Gibbs, Donna; Krause, Kerri-Lee, eds. (2006-06-01).
113:
A post flood on an IRC channel, repeating the term "
1675:
1649:
1623:
1582:
1506:
1485:
1444:
1405:
1398:
1372:
1336:
1260:
1219:
1158:
722:
Securing IM and P2P Applications for the Enterprise
547:
Malicious Mobile Code: Virus Protection for Windows
1059:
876:
845:
607:
529:. pp. 302, 98, 134, 170β172, 268β269, 300.
192:Example of a message flood using over 50 clones.
910:Northcutt, Stephen; Novak, Judy (2002-09-06).
1122:
8:
724:. foreword by Kevin Beaver (1st ed.).
1402:
1129:
1115:
1107:
1102:Flood protection and ignoring information
494:
456:
415:
306:Learn how and when to remove this message
16:Denial-of-service attack on Internet chat
826:Information Security Management Handbook
803:Information Security Management Handbook
668:Netaholics?: The Creation of a Pathology
269:This article includes a list of general
962:Skoudis, Ed; Liston, Tom (2006-01-02).
828:(6th ed.). Auerbach Publications.
147:This type consists of initiating many
67:Internet Relay Chat Flooding/Scrolling
7:
1016:: Syngress Publishing. p. 19.
1010:Combating Spyware in the Enterprise
637:Rheingold, Howard (October 1993).
342:"Logging and Reporting IRC Abuses"
275:it lacks sufficient corresponding
14:
776:Hacking Exposed: Web Applications
666:Surratt, Carla G. (1999-08-01).
544:Grimes, Roger A. (August 2001).
260:
23:
1070:: Syngress Publishing. p.
1041:Springer Science+Business Media
875:Bidgoli, Hossein (2003-12-23).
856:: Syngress Publishing. p.
479:Kalt, Christophe (April 2000).
805:. Vol. 2 (5th ed.).
360:Brinton, Aaron (August 1997).
1:
606:Crystal, David (2006-09-18).
321:Pioch, Nicolas (1993-02-28).
1062:Botnets: The Killer Web App
912:Network Intrusion Detection
517:Mutton, Paul (2004-07-27).
441:; Reed, Darren (May 1993).
159:Typically referred to as a
36:to comply with Knowledge's
1738:
616:Cambridge University Press
380:Powers, Ray (1998-07-30).
1700:
1662:Mozilla Application Suite
1145:
879:The Internet Encyclopedia
699:James Nicholas Publishers
610:Language and the Internet
577:(anonymous) (June 1997).
400:Reed, Darren (May 1992).
987:Security+ Training Guide
784:McGraw-Hill Professional
757:McGraw-Hill Professional
49:may contain suggestions.
34:may need to be rewritten
1068:Rockland, Massachusetts
1014:Rockland, Massachusetts
854:Rockland, Massachusetts
726:Rockland, Massachusetts
676:Nova Science Publishers
382:"The myths of opers..."
290:more precise citations.
117:" several hundred times
1650:Web browser components
193:
118:
1150:Comparison of clients
945:John Wiley & Sons
889:John Wiley & Sons
807:Auerbach Publications
560:188, 239β240, 242β243
362:"IRC Operators Guide"
191:
112:
1676:Library and plug-ins
1462:Microsoft Comic Chat
1097:mIRC script database
786:. pp. 370β373.
759:. pp. 494β497.
701:. pp. 270β271.
323:"A short IRC primer"
1667:Mozilla Thunderbird
1138:Internet Relay Chat
941:Hoboken, New Jersey
885:Hoboken, New Jersey
730:Syngress Publishing
672:Hauppauge, New York
780:New York, New York
753:New York, New York
194:
119:
1709:
1708:
1696:
1695:
1445:Microsoft Windows
1220:Related protocols
1081:978-1-59749-135-8
954:978-0-471-70355-6
835:978-0-8493-7495-1
439:Oikarinen, Jarkko
316:
315:
308:
231:Computer security
75:Denial of Service
64:
63:
38:quality standards
1729:
1403:
1390:Jarkko Oikarinen
1380:List of commands
1131:
1124:
1117:
1108:
1085:
1065:
1054:
1035:(1st ed.).
1027:
1012:(1st ed.).
1004:
981:
966:(2nd ed.).
958:
929:
914:(3rd ed.).
906:
883:(1st ed.).
882:
871:
851:
839:
820:
797:
778:(2nd ed.).
770:
751:(5th ed.).
743:
712:
697:(2nd ed.).
689:
662:
643:(1st ed.).
633:
614:(2nd ed.).
613:
602:
573:
540:
521:(1st ed.).
513:
511:
510:
498:
496:10.17487/RFC2813
475:
473:
472:
460:
458:10.17487/RFC1459
434:
432:
431:
419:
417:10.17487/RFC1324
396:
394:
393:
376:
374:
373:
364:. Archived from
356:
354:
353:
344:. Archived from
337:
335:
334:
325:. Archived from
311:
304:
300:
297:
291:
286:this article by
277:inline citations
264:
263:
256:
59:
56:
50:
27:
19:
1737:
1736:
1732:
1731:
1730:
1728:
1727:
1726:
1712:
1711:
1710:
1705:
1692:
1671:
1645:
1619:
1578:
1502:
1481:
1440:
1394:
1368:
1332:
1256:
1215:
1154:
1141:
1135:
1093:
1088:
1082:
1057:
1051:
1043:. p. 266.
1030:
1024:
1007:
1001:
984:
978:
961:
955:
932:
926:
916:SAMS Publishing
909:
903:
874:
868:
842:
836:
823:
817:
809:. p. 517.
800:
794:
773:
767:
746:
740:
715:
709:
692:
686:
678:. p. 156.
665:
659:
636:
630:
605:
599:
585:SAMS Publishing
576:
570:
543:
537:
516:
508:
506:
478:
470:
468:
437:
429:
427:
399:
391:
389:
379:
371:
369:
359:
351:
349:
340:
332:
330:
320:
312:
301:
295:
292:
282:Please help to
281:
265:
261:
254:
227:
219:
211:
199:
182:
174:
157:
145:
132:
124:
107:
105:Types of floods
87:
60:
54:
51:
41:
28:
17:
12:
11:
5:
1735:
1733:
1725:
1724:
1714:
1713:
1707:
1706:
1701:
1698:
1697:
1694:
1693:
1691:
1690:
1685:
1679:
1677:
1673:
1672:
1670:
1669:
1664:
1659:
1653:
1651:
1647:
1646:
1644:
1643:
1638:
1633:
1627:
1625:
1621:
1620:
1618:
1617:
1612:
1607:
1602:
1597:
1592:
1586:
1584:
1580:
1579:
1577:
1576:
1571:
1566:
1561:
1556:
1551:
1546:
1541:
1536:
1531:
1526:
1521:
1516:
1510:
1508:
1507:Cross-platform
1504:
1503:
1501:
1500:
1495:
1489:
1487:
1483:
1482:
1480:
1479:
1474:
1469:
1464:
1459:
1454:
1448:
1446:
1442:
1441:
1439:
1438:
1433:
1428:
1423:
1418:
1415:
1409:
1407:
1400:
1396:
1395:
1393:
1392:
1387:
1382:
1376:
1374:
1370:
1369:
1367:
1366:
1361:
1356:
1351:
1346:
1340:
1338:
1334:
1333:
1331:
1330:
1325:
1320:
1315:
1310:
1305:
1300:
1295:
1290:
1285:
1280:
1275:
1270:
1264:
1262:
1258:
1257:
1255:
1254:
1249:
1244:
1239:
1234:
1229:
1223:
1221:
1217:
1216:
1214:
1213:
1208:
1203:
1198:
1193:
1188:
1183:
1178:
1173:
1168:
1162:
1160:
1156:
1155:
1153:
1152:
1146:
1143:
1142:
1136:
1134:
1133:
1126:
1119:
1111:
1105:
1104:
1099:
1092:
1091:External links
1089:
1087:
1086:
1080:
1055:
1049:
1028:
1022:
1005:
999:
991:Que Publishing
982:
976:
959:
953:
930:
924:
907:
901:
872:
866:
840:
834:
821:
815:
798:
792:
771:
765:
744:
738:
713:
707:
690:
684:
663:
657:
634:
628:
603:
597:
574:
568:
556:O'Reilly Media
552:Sebastopol, CA
541:
535:
527:O'Reilly Media
523:Sebastopol, CA
514:
476:
435:
397:
384:Archived from
377:
357:
338:
317:
314:
313:
268:
266:
259:
253:
250:
249:
248:
243:
238:
233:
226:
223:
218:
215:
210:
207:
198:
195:
181:
178:
173:
170:
156:
153:
144:
141:
131:
128:
123:
120:
106:
103:
86:
83:
62:
61:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1734:
1723:
1720:
1719:
1717:
1704:
1699:
1689:
1686:
1684:
1681:
1680:
1678:
1674:
1668:
1665:
1663:
1660:
1658:
1655:
1654:
1652:
1648:
1642:
1639:
1637:
1634:
1632:
1629:
1628:
1626:
1622:
1616:
1613:
1611:
1608:
1606:
1603:
1601:
1598:
1596:
1593:
1591:
1588:
1587:
1585:
1581:
1575:
1572:
1570:
1567:
1565:
1562:
1560:
1557:
1555:
1552:
1550:
1547:
1545:
1542:
1540:
1537:
1535:
1532:
1530:
1527:
1525:
1522:
1520:
1517:
1515:
1512:
1511:
1509:
1505:
1499:
1496:
1494:
1491:
1490:
1488:
1484:
1478:
1475:
1473:
1470:
1468:
1465:
1463:
1460:
1458:
1455:
1453:
1450:
1449:
1447:
1443:
1437:
1434:
1432:
1429:
1427:
1424:
1422:
1419:
1416:
1414:
1411:
1410:
1408:
1404:
1401:
1397:
1391:
1388:
1386:
1383:
1381:
1378:
1377:
1375:
1371:
1365:
1362:
1360:
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1341:
1339:
1335:
1329:
1326:
1324:
1321:
1319:
1316:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1296:
1294:
1291:
1289:
1286:
1284:
1281:
1279:
1276:
1274:
1271:
1269:
1266:
1265:
1263:
1259:
1253:
1250:
1248:
1245:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1224:
1222:
1218:
1212:
1209:
1207:
1204:
1202:
1199:
1197:
1194:
1192:
1189:
1187:
1184:
1182:
1179:
1177:
1174:
1172:
1169:
1167:
1164:
1163:
1161:
1157:
1151:
1148:
1147:
1144:
1139:
1132:
1127:
1125:
1120:
1118:
1113:
1112:
1109:
1103:
1100:
1098:
1095:
1094:
1090:
1083:
1077:
1073:
1069:
1064:
1063:
1056:
1052:
1050:1-85233-661-7
1046:
1042:
1038:
1034:
1029:
1025:
1023:1-59749-064-4
1019:
1015:
1011:
1006:
1002:
1000:0-7897-2836-2
996:
992:
988:
983:
979:
977:0-13-148104-5
973:
969:
968:Prentice Hall
965:
960:
956:
950:
946:
942:
938:
937:
931:
927:
925:0-7357-1265-4
921:
917:
913:
908:
904:
902:0-471-22201-1
898:
894:
890:
886:
881:
880:
873:
869:
867:1-59749-056-3
863:
859:
855:
850:
849:
841:
837:
831:
827:
822:
818:
816:0-8493-3210-9
812:
808:
804:
799:
795:
793:0-07-226299-0
789:
785:
781:
777:
772:
768:
766:0-07-226081-5
762:
758:
754:
750:
745:
741:
739:1-59749-017-2
735:
731:
727:
723:
719:
718:Sachs, Marcus
714:
710:
708:1-875408-42-8
704:
700:
696:
691:
687:
685:1-56072-675-X
681:
677:
673:
669:
664:
660:
658:0-201-60870-7
654:
650:
646:
642:
641:
635:
631:
629:0-521-86859-9
625:
621:
617:
612:
611:
604:
600:
598:1-57521-268-4
594:
590:
586:
582:
581:
575:
571:
569:1-56592-682-X
565:
561:
557:
553:
549:
548:
542:
538:
536:0-596-00687-X
532:
528:
524:
520:
515:
505:
502:
497:
492:
488:
484:
483:
477:
467:
464:
459:
454:
450:
446:
445:
440:
436:
426:
423:
418:
413:
409:
405:
404:
398:
388:on 2009-08-15
387:
383:
378:
368:on 2009-08-14
367:
363:
358:
348:on 2009-08-15
347:
343:
339:
329:on 2009-08-14
328:
324:
319:
318:
310:
307:
299:
289:
285:
279:
278:
272:
267:
258:
257:
251:
247:
244:
242:
239:
237:
234:
232:
229:
228:
224:
222:
216:
214:
208:
206:
204:
197:Message flood
196:
190:
186:
179:
177:
171:
169:
166:
162:
154:
152:
150:
142:
140:
137:
129:
127:
122:Connect flood
121:
116:
111:
104:
102:
100:
96:
92:
84:
82:
80:
76:
72:
68:
58:
48:
44:
39:
35:
32:This article
30:
26:
21:
20:
1529:Konversation
1180:
1159:Common terms
1061:
1032:
1009:
986:
963:
935:
911:
878:
847:
825:
802:
775:
748:
721:
694:
667:
639:
609:
579:
546:
518:
507:. Retrieved
481:
469:. Retrieved
443:
428:. Retrieved
402:
390:. Retrieved
386:the original
370:. Retrieved
366:the original
350:. Retrieved
346:the original
331:. Retrieved
327:the original
302:
293:
274:
241:Smurf attack
220:
212:
209:Notice flood
202:
200:
183:
175:
172:Invite flood
158:
146:
133:
125:
88:
66:
65:
55:January 2012
52:
43:You can help
33:
1574:Quassel IRC
1293:Libera Chat
891:. pp.
645:Basic Books
587:. pp.
558:. pp.
288:introducing
91:taking over
1605:Miranda NG
1477:Visual IRC
1385:Subculture
1364:UnrealIRCd
1337:Technology
1176:DoS attack
647:. p.
618:. p.
509:2009-05-25
471:2009-05-25
430:2009-05-25
392:2009-05-25
372:2009-05-25
352:2009-05-25
333:2009-05-25
271:references
252:References
217:Nick flood
180:Post flood
155:ICMP flood
130:CTCP flood
1657:ChatZilla
1624:Web-based
1590:Centericq
1486:Unix-like
1283:GameSurge
519:IRC Hacks
143:DCC flood
47:talk page
1716:Category
1703:Category
1615:Trillian
1583:Multi-IM
1539:LeafChat
1472:Shareaza
1431:Linkinus
1413:Colloquy
1373:See also
1328:Undernet
1318:SlashNET
1303:QuakeNet
1278:Freenode
1261:Networks
1232:MSN Chat
1211:Takeover
1206:Services
1191:Operator
1186:Netsplit
296:May 2009
225:See also
1631:CGI:IRC
1595:Empathy
1564:HexChat
1559:WeeChat
1549:Nettalk
1452:Bersirc
1399:Clients
1354:BitlBee
1349:Infobot
1344:Eggdrop
1323:Snoonet
1037:Germany
895:, 213.
720:(ed.).
589:140β141
284:improve
246:WinNuke
99:scripts
85:History
1641:Mibbit
1610:Pidgin
1600:Kopete
1519:BitchX
1313:RusNet
1288:IRCnet
1268:DALnet
1196:Script
1078:
1047:
1020:
997:
974:
951:
922:
899:
864:
832:
813:
790:
763:
736:
705:
682:
655:
626:
595:
566:
533:
273:, but
203:clones
134:Since
69:on an
45:. The
1688:rcirc
1636:PJIRC
1569:PJIRC
1554:Smuxi
1534:KVIrc
1524:Irssi
1514:Ayttm
1493:ircII
1467:PIRCH
1426:Ircle
1421:Homer
1406:macOS
1308:Rizon
1273:EFnet
1252:Ident
1181:Flood
1140:(IRC)
236:Flood
1544:naim
1457:mIRC
1436:Snak
1417:Fire
1298:OFTC
1247:XDCC
1237:CTCP
1227:IRCX
1201:IRCd
1076:ISBN
1045:ISBN
1018:ISBN
995:ISBN
972:ISBN
949:ISBN
920:ISBN
897:ISBN
862:ISBN
830:ISBN
811:ISBN
788:ISBN
761:ISBN
734:ISBN
703:ISBN
680:ISBN
653:ISBN
624:ISBN
593:ISBN
564:ISBN
531:ISBN
504:2813
487:IETF
466:1459
449:IETF
425:1324
408:IETF
165:ICMP
161:ping
136:CTCP
97:and
95:bots
1722:IRC
1683:ERC
1359:ZNC
1242:DCC
1171:Bot
1166:BNC
893:209
858:170
649:185
620:160
501:RFC
491:doi
463:RFC
453:doi
422:RFC
412:doi
149:DCC
115:OMG
79:lag
71:IRC
1718::
1498:Ii
1074:.
1072:80
1066:.
1039::
993:.
989:.
970:.
947:.
943::
939:.
918:.
887::
860:.
852:.
782::
755::
732:.
728::
674::
670:.
651:.
622:.
591:.
583:.
562:.
554::
550:.
525::
499:.
489:.
485:.
461:.
451:.
447:.
420:.
410:.
406:.
1130:e
1123:t
1116:v
1084:.
1053:.
1026:.
1003:.
980:.
957:.
928:.
905:.
870:.
838:.
819:.
796:.
769:.
742:.
711:.
688:.
661:.
632:.
601:.
572:.
539:.
512:.
493::
474:.
455::
433:.
414::
395:.
375:.
355:.
336:.
309:)
303:(
298:)
294:(
280:.
57:)
53:(
40:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.