View Single Post
  #597  
Old 06-03-2014, 02:04 PM
sammyboyfor's Avatar
sammyboyfor sammyboyfor is offline
Cyberspace Nerd
 
Join Date: Dec 2001
Location: Close to you
Posts: 14,217
Mentioned: 29 Post(s)
Tagged: 0 Thread(s)
Quoted: 486 Post(s)
My Reputation: Points: 2823 / Power: 300
sammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond reputesammyboyfor has a reputation beyond repute
Re: Sammyboyforum/SammyboySexforum laggy

Quote:
Originally Posted by ah rat View Post
If pm u,will u say nutcase again
I referred to you as a nutcase for having to log in via google instead of simply bookmarking the forum url.

Cloudflare has been under a lot of pressure over the last few weeks too. The web is becoming a very complicated place. It mirrors real life in almost every aspect nowadays.

Read http://blog.cloudflare.com/technical...on-ddos-attack

It's very interesting but scary at the same time.

++++++++++++++++++++++++++++

Technical Details Behind a 400Gbps NTP Amplification DDoS Attack

Published on February 13, 2014 01:00AM by Matthew Prince.


On Monday we mitigated a large DDoS that targeted one of our customers. The attack peaked just shy of 400Gbps. We've seen a handful of other attacks at this scale, but this is the largest attack we've seen that uses NTP amplification. This style of attacks has grown dramatically over the last six months and poses a significant new threat to the web. Monday's attack serves as a good case study to examine how these attacks work.

NTP Amplification 101

Before diving into the particular details of this attack, it's important to understand the basic mechanics of how NTP amplification attacks work. This is a quick overview of how these attacks occur. John Graham-Cumming on our team previously wrote a detailed primer on NTP amplification attacks if you're interested in further technical details. If you're interested in amplification attacks, you may also find interesting our posts about DNS Amplification attacks. These attacks use a similar method but target open DNS resolvers rather than NTP servers.

An NTP amplification attack begins with a server controlled by an attacker on a network that allows source IP address spoofing (e.g., it does not follow BCP38). The attacker generates a large number of UDP packets spoofing the source IP address to make it appear the packets are coming from the intended target. These UDP packets are sent to Network Time Protocol servers (port 123) that support the MONLIST command.

I'd personally be curious to talk with whoever added MONLIST as a command to NTP servers. The command seems of such little practical use -- it returns a list of up to the last 600 IP addresses that last accessed the NTP server -- and yet it can do so much harm. If an NTP server has its list fully populated, the response to a MONLIST request will be 206-times larger than the request. In the attack, since the source IP address is spoofed and UDP does not require a handshake, the amplified response is sent to the intended target. An attacker with a 1Gbps connection can theoretically generate more than 200Gbps of DDoS traffic.

Not Just Theoretical

Monday's DDoS proved these attacks aren't just theoretical. To generate approximately 400Gbps of traffic, the attacker used 4,529 NTP servers running on 1,298 different networks. On average, each of these servers sent 87Mbps of traffic to the intended victim on CloudFlare's network. Remarkably, it is possible that the attacker used only a single server running on a network that allowed source IP address spoofing to initiate the requests.

While NTP servers that support MONLIST are less common than open DNS resolvers, they tend to run on beefier servers with fatter connections to the network. Combined with the high amplification factor, this allows a much smaller number of NTP servers to generate very large attacks. For comparison, the attack that targeted Spamhaus used 30,956 open DNS resolvers to generate a 300Gbps DDoS. On Monday, with 1/7th the number of vulnerable servers, the attacker was able to generate an attack that was 33% larger than the Spamhaus attack.
__________________
Tips for ALL samsters.
  1. Keep your identity secret.
  2. Do not divulge personal information eg phone numbers, real names & addresses.
  3. If you do arrange social meetings through this site, do NOT reveal your primary sammyboy nick.
  4. Whores are for fucking not loving. Just fuck them and be done with it.
Sign up for Premium Membership for great discounts and whole host of other forum benefits. Premium Membership details.





scan this code for SBF updates