Bog'liq microsoft-pptp-vpn-vulnerabilities-exploits-action 337
Signature of the attack: System CPU utilization at 100% and Memory at 50%.
Applications and command line commands won’t function and give unusual
errors.
PPTP and other services unresponsive.
Below is a typical Ethereal sniffing session screenshot (on Linux) during this
attack (you may want to increase the magnification of this document to see
screenshot more clearly):
IDS can be easily setup to detect these packets. As you can see,
malformed IP protocol GRE (0x2f) packets are being easily detected.