Some additional information about ZerXes taken from an inteview (link posted at the end of my comments)
Q: How did you first develop your DoS technique?
A: Okay it started with a little script I wrote a while back to harden-test servers. I modified this script, and it was just a nasty script, very cumbersome. When I realized the extent of the jihad online recruiting and co-ordination involvement (much later), I realized I could turn this script into a weapon. But the problem with that was it took me constantly shell hopping and wasn’t very user friendly. Now I have started on project XerXeS, an intelligent frontend with the ability to hit multiple targets autonomously.
Q: So the automation does not hinder your technique’s effectiveness?
No, not at all. Each new wave uses a different IP
(location). It starts with just one, but ramps it up if it detects system counter-measures.
Q: What are the implications if something like XerXeS was combined with a large zombie network, and coordinated against critical U.S. infrastructure, like our communications, power grids, or financial systems?XerXes requires no zombie network or botnet to be effective
. Once a single attacking machine running XerXeS has smacked down a box, it's down, there is no need for thousands of machines. But, XerXeS does not hurt intermediary nodes along its path to the target. So the answer is that such institutions’ systems would still be intact, as it causes no collateral damage, just not functional. https://www.infosecisland.com/blogview/ ... ttack.html
All men by nature desire knowledge.