 #README 03.09.04
 #author: b at swag.at
 #copyright: b at swag.at
 Idea:

	The idea is pretty simple. What happens if you send a packet to a remote host
	with raised SYN flag ? Yes, if the target system accepts connections at the
	targetted port, it will mostlikely answer with a packet with raised ACK flag.

	But what if you send 1000 packets with spoofed source addresses to various 
	hosts on the internet or your LAN ? Well, if you supply a source address 
	of a valid host, this host will recieve the responses of all those hosts
	which have recieved your forged SYN packet.
	If you have enough hosts to recieve your forged packets, this technique can
	lead to a bandwith consumption attack (a simple distributed DoS attack).

	To learn more about DrDoS attacks, visit: http://grc.com/dos/drdos.htm
	To learn more about the Transmission Control Protocol, read RFC 793


The code:

	You will need at least libnet 1.1.0 to compile the program. The program has
	to be started with a set of parameters. Start the program without any arguments
	for a argument list.
	This was my first attempt to use the libnet library. This program is far from
	being "good". Forging a packet with libnet is realy not difficult.

	Get libnet here, www.packetfactory.net/Projects/Libnet/


The hostlist:
	
	To test this code, you have to have a list of valid IP addresses. Format as
	follows:

	xxx.xxx.xxx.xxx
	xx.xxx.xx.xxx
	.
	.

	As you can see, you have to provide a textfile with one IP in each line. Easy eh?
 

TODO:

	Multi thread support for higher efficiency ? :)


A few words:

	The main aim of this code was to learn the basics of the libnet library. 
	I have just scratched the surface, libnet is capable of alot more ;) 
	If you use this code to do something
	illegal, don't blame me!

	thanks to m0rt for the AWESOME project name!

	you can visit us here: IRC/Undernet/#seks4president
  

