Tuesday, February 18, 2014

  My rage about people taking down small gaming private servers... Enjoy..

  So I've noticed a lot of people think they are oh so clever now a days with DDOS(ing) small servers or self hosted personal webpages with out some sort of protection. It makes me sad to be honest that these skiddies get away with such vandalism to the virtual world.
We now even have apps to allow phone users to join in on DDOS attacks.

    Now let me fill you in for those who don't know what LOIC is. It simply stands for LOW ORBIT ION CANNON. It's a nice open source stress tester (sourceforge.net/projects/loic/).

Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain,[1] and now is hosted on several open source platforms.[2][3]
The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.[4]
LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.[5]

For those of us who want to use it for good, it can help us see how much our websites or server can handle at once before it goes down.. But the evil inside all of man kind even buds its head online and the luls come next. But for those who attack on a larger scale they are usually using a Botnet! For more news about such large scale attacks like the latest to a Flarecloud customer head over to http://www.ddosattacks.net/. The latest large scale botnet hit an amazing 400gbs.
In this instance, attackers used NTP reflection to exploit a weakness in the UDP-based NTP, which connects to the Internet to synchronise clocks on machines. The hackers then spoofed the IP address of the target, and sent DNS queries to open DNS resolvers that will answer requests from anywhere. As a result, overwhelming levels of traffic were sent back to the NTP server. CloudFlare has a detailed blog post on NTP reflection attacks.



Post a Comment

LIKE ON FACEBOOK Follow me on Twitter!