Jump to content

chain

Site Moderator
  • Posts

    540
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by chain

  1. Please join us on October 17th in #Sidewalkcafe and help us celebrate our birthday. We plan to party all day long!
  2. I was reading a blog about chats and about software when i came across this piece and thought how true!
  3. Welcome Back morph3us
  4. Proactive self-defense can make DDoS attacks less painful and damaging I had read this and thought it would be interesting for some There's no way to prevent a distributed denial-of-service (DDoS) attack, but there are some do-it-yourself techniques and strategies for fighting back and minimizing its impact. DDoS victims can "tarpit," or force the attacking bot to drastically scale back its payload, enlist the help of the botnet hunter community, or even get help to wrest control of the botnet. Joe Stewart, a researcher with SecureWorks' Counter Threat Unit, says these self-defense techniques are little known or used today by victims of DDoS attacks, but they offer an alternative to purchasing a commercial DDoS product or service and working with ISPs to try to stop an attack. "You can't prevent someone from launching the attack, but you can do a better job at mitigating it through technical measures," Stewart says. Tarpitting doesn't work in every case, he says, but it's easy to deploy and doesn't cost anything. "Just being able to respond better to these attacks is something that requires relationship-building with people who have pieces of the puzzle," such as the research community, he says. Tarpitting works against HTTP-based attacks, which researchers say make up the majority of DDoS attacks today. HTTP-based DDoS attacks are often more effective than SYN flood DDoS attacks, and it's easier to max out the Web server's connections or CPU/memory than to overload the pipe with a SYN flood, experts say. The tarpit method works with TCP/IP features embedded in Linux, namely the NetFilter feature, according to Stewart, and can be used with a Windows server with the help of a tarpit toolkit, such as LaBrea. Tarpitting basically forces the bot to send the victim's server less traffic. "You use it to say to the attacker, 'I'm so congested that you can't send me any more than 1 byte before I respond to you,' for instance," Stewart says. "The attacker gets in a loop trying to send 1 byte and waiting for a response [he] never gets." And unless the botnet operator is closely monitoring his bots, he won't notice the slowdown. The only clue that the DDoS attack was foiled? Its target didn't go down as the attacker had expected, Stewart says. Stewart says when he tested tarpitting against an attack bot, he found another interesting side effect of the defense method: One bot's CPU hit 100 percent, rendering the system unusable. "It almost reflected the DDoS attack back onto them. In their attempt to maintain all these connections and retries, it started using up all the CPU time on the system," Stewart says. Jose Nazario, manager of security research for Arbor, says he sees few DDoS victims using these techniques today. "Unfortunately, it's pretty rare. It's valuable," he says. "The [tradeoff] is that it can have a negative impact on legitimate PC users [who are bot-infected]. After a while, they can't make any requests at all." The safest defense against DDoS attacks is to recruit the help of researchers with expertise in botnets. Stewart recommends IT security teams get out and meet their peers and researchers and attend ISSA and InfraGuard meetings, for instance. They key is getting help in tracking down the offending botnet's command and control (C&C) servers, he says. "It could be something as simple as getting a hosting provider to take down a C&C by providing them proof that a host [using their service] was attacking you," he says. And there are some researchers willing to venture into a grey legal area and actually go in and take over a botnet, he says. "Gaining unauthorized access to an infected computer is not something [secureWorks] would do here," he says. "But there are some other researchers who've shown they are willing to take over botnets and issue them commands. If you're under attack, it's a kind of self-preservation." Stewart says C&C servers are often vulnerable themselves to common Web attacks, like cross-site scripting and SQL injection. "They are usually sloppily programmed," he says. "And you can get a lot of knowledge from a SQL injection [vulnerability] in their script. But legally, this is probably not a good idea." Meanwhile, some security experts like HD Moore have used more aggressive methods to fight a DDoS attack. Moore, creator of Metasploit, had a little fun at his DDOS attackers' expense earlier this year, turning the tables on the botnet that hammered away at Metasploit's servers. Moore changed DNSes in an attempt to evade the attackers, and also tried using Google Sites' Web hosting to mitigate the DDoS, but once Google Sites hit its page limits, he had to abort that tack. He was able to eventually narrow down the C&C domains after enlisting the help of botnet researchers. The researchers black-holed one of the domains, and Moore then executed a "reverse" on the other two C&C domains, pointing the traffic that was flooding his Metasploit site back onto the attackers' domains so they were DDoS'ing themselves. But these techniques are bit too technical and risky for most enterprises. SecureWorks' Stewart, who was one of the researchers who helped Moore find the culprit C&C domains, says it would be possible for an enterprise hit by a DDoS to follow Moore's lead by changing its IP address to that of the C&C's IP. "If the bots are attacking you by looking up your host name, you can change your IP address to the C&C IP once you learn where it is. This is easy, but causes [your site] to be down still, and causes your legit traffic to visit a botmaster-owned site -- a little scary if it comes back up before you change the DNS back," he says. He says it's best to use legitimate abuse-reporting channels in the security community to help take down a botnet. And heres the story regarding turning the tables around on the Botnet : http://www.darkreading.com/security/attack...cleID=214501208
  5. Ok problem solved was with a mod file and it screwed up the apache/php
  6. Just to let you know ChainScriptz is down and when you click on the addy it ask you to download something...Plz dont download it as we dont know what it is. I will let you know when we have the site back up ..but once again dont download the download its saying too!!
  7. Ok if your having issues signing into Buzzen, you will need to sign in from this link for a bit of time as they are working on the problem right now. http://www.buzzen.net/signin2.aspx
  8. Oh yeah it dose ..what about klownz botz LOL .....what about ozzy scripting that brings old memories dam very old memories kenobi script.....OMG its Casa Hey stranger
  9. I got a kick out of this one New York (NY) - The delightful woman behind the Skanks of New York blog is demanding $15 million damages from Google, the company that hosted her rants against her ex-friend, Canadian model Liskula Cohen. Google is accused of 'breaching its fiduciary duty to protect her expectation of anonymity'. And in a rather bizarre statement, Rosemary Port says Cohen herself is to blame for the row in which Port referred to her as an old hag, a ho and a psychotic, lying, whoring skank. "This has become a public spectacle and a circus that is not my doing," Port told the New York Daily News. "By going to the press, she defamed herself." The unemployed 29 year old claimed that before Cohen filed a $3 million defamation suit against her (which Cohen subsequently dropped): "There were probably two hits on my Web site: One from me looking at it, and one from her looking at it. That was before it became a spectacle. I feel my right to privacy has been violated. "I feel proud to live in a country where you're not persecuted for your opinions," Port added. "That right has to be protected."
  10. Dam some of you folks are harsh on your President. And to be honest from this point of view give the guy a chance ..no one can be any worse then your last president!!
  11. Man twitter just seems to spread around with good reviews then bad reviews LOL now the NFL is getting a bit under the collar with there atheletes that are using twitter!!
  12. InspIRCd 1.2 RC4 Released
  13. chain

    Geeksirc Issues

    LOL we all do it Rift its a part of the forum postings.
  14. Dam I was reading this and was amazed at some of the things the Professional athletes do on twitter. But it shows some of them to be human But as of now ESPN is telling them not to twitt anything that has to do with memo's or any other documents in relations to ESPN.
  15. Hey haggis looking good. Looking forward to seeing more and more as you progress
  16. This is simply unbelievable. The "Miniature Wonderland" model railroad in Hamburg , Germany the largest in the world, covering 16,146 square feet of space with more than 10,000 train cars running around its 6.8 miles of HO scale track. Now, the makers of this huge layout have created a video that gives you a jaw-dropping look at the vast scope of this intricate work of art. Its construction started in 2000, and is still underway, with a tiny airport due for completion by the end of this year. This is just the beginning — there are plans to double to layout by 2014. We especially like the Las Vegas portion, complete with dazzling LEDs lighting up the night. You have to watch the new video to get the full impact of this remarkable achievement, which has taken in excess of 500,000 working hours to build. There's good reason why this is Germany 's most popular attraction, already visited by more than 5 million flabbergasted tourists.
  17. Hey Meg it was used for Buzzen, but [::X-System::] made it for himself, if he wanted people to have it he would have released it. But also you can look at SoulFly or Moschino they both have a room lister!! and they are a full connection for the Buzzen server, with many addons included into the connection as we have stated to you before If you need more help in finding a suitable script for yourself dont hesitate to ask. The people here will assist and give u there opinions on which is a good beginners script!!
  18. hey hey now I didnt say they were the best but i have used them for 5 to 6yrs and no issues on my part, But like i said thats me ..different for others and if you go to other sites some will get the same feed back ..everyone has there own prefference. So ner u old git LOL
  19. Welcome Game Master to techgear!!
  20. hey meg welcome to Techgear
  21. Iam with 1&1 been with them for yrs no issues really and i have a few domains on my host server. any issues they are quick! but thats my experince http://www.1and1.com/
  22. chain

    Geeksirc Issues

    Ok I've been watching this close and learned that they finally made a response as to the drama which was going on. As quoted by GeeksIRC Due to avoid more drama GeeksIRC decided to fix the issues and go ahead and make there own announcement ..but while doing this they also have raised a few eyebrowse as to why they didnt display this on any of the IRC server websites or the famous irc.junkie.org...!!
×
×
  • Create New...