The criminal creators of the hugely popular Dirt Jumper DDoS toolkit appear to have been sloppy with their own security, introducing software vulnerabilities that leave the software's command and control (C&C) servers open to attack, security firm Prolexic has discovered.
Overwhelmingly, the business of DDoS defence is usually about blocking attacks once they start, or finding a conventional route to access the C&C servers on a case-by-case basis, so Prolexic's discovery of flaws in the code itself counts as noteworthy.
Despite Dirt Jumper's well-developed attack features, Prolexic found holes in the simplest part of the program, namely the GUI control panels used to control bots created by it which turned out to be cobbled together using hastily-coded PHP/MySQL scripts.
In Prolexic's words, these proved open to compromise on a number of levels including "weak authentication mechanisms, file inclusion vulnerabilities, directory traversal vulnerabilities, and SQL injections."
Continued : http://news.techworld.com/security/3376047/popular-dirt-jumper-ddos-toolkit-riddled-with-security-flaws-research-finds/
Also:
Researchers Find Flaw in Dirt Jumper Bot
'Kill switch' flaw found in top web weapon, victims sigh with relief

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic