Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
DDOS Attacks and Hackers
Message
<blockquote data-quote="Ghosthunter" data-source="post: 559" data-attributes="member: 6"><p><img src="https://telegra.ph/file/34b6ed73956edb4c6eba8.png" alt="34b6ed73956edb4c6eba8.png" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>Well, usually a few men gather in a dark room that is illuminated only by the light from the screens, or a cheap neon. Mandatory attributes: everyone in the room must wear a Guy Fawkes mask, because we are for complete anonymity. The dress code is dark jeans and a plain hoodie. And for the entourage, we can add gloves with cutouts for the fingertips. The number of monitors is automatically multiplied by x4 based on the number of hackers, a bunch of incomprehensible wires sticking out of the system blocks, and one flash drive with an inaccurately glued sticker on which says "never play this".</p><p></p><p>Next to the computers is an empty pizza box and an unpacked redbull block. Everything seems to be ready. It remains to determine, Whose usual life from today will forever change? Perhaps the victim will be an unsuspecting clerk from the London Stock Exchange, or a popular blogger, and perhaps even Donald Trump himself.</p><p></p><p>And if you bend the whole world at once and hack the servers of the Federal Reserve System? Then the effect is difficult even to imagine. And if you try to do something good? For example, hack the accounts of some terrorists from Igil or sites that distribute child pornography. Then we will definitely become heroes in the eyes of the public.</p><p></p><p>But, our protagonists choose a very mundane goal. How about hacking GitHub. What for? Just like that! We conduct brainstorming and analytical work. We find vulnerabilities and determine the best tool. And here it is. The DDos attack begins.</p><p></p><p>I hope you managed to completely immerse yourself in the atmosphere of hacker romance and a lot of interesting things await us ahead. But first, a little history and familiarity with the terms. The history of hacker attacks began almost from the very beginning of the launch of the Internet, because as we know, if there is a system, then there will always be craftsmen who will certainly want to break it.</p><p></p><p>The first type of hacker attacks is considered to be such a thing as mailbombing or the bombing of email addresses. As soon as e-mail was widely used in large companies in the mid-90s, the ancestors of modern hackers came up with an uncomplicated way to complicate the life of ordinary or not very ordinary plankton.</p><p></p><p>And the essence of the method was in banal spam. A lot of meaningless letters were sent to the mailbox of a particular person, which made it impossible to work with the mailbox itself. Roughly speaking, there were so many letters that a person could not find real ones among them and fell into a binge. Such attacks, of course, were carried out from anonymous mail servers, because of which the mail provider could not identify the real sender and limit the number of letters. Nowadays, of course, email clients have become an order of magnitude smarter, so this method has become less relevant, but nevertheless, it has fulfilled its fundamental role in the hacker craft.</p><p></p><p>With the development of the Internet, heaps of new attack methods have emerged, such as buffer overflows, the spread of viruses, worms and Trojans, social engineering, and more. But each of them deserves a separate material on our channel, so we will focus on the topic that interests the absolute majority. A topic that has become the main argument and punitive weapon of any self-respecting schoolboy-paladin, whose goal is to fight against everything unscrupulous, or just for the sake of entertainment and feeding his own Ego. As you may have guessed, we are talking about a DDoS attack, which has unlimited power in terms of position on the blades of the website of your native school or even your favorite Netflix service.</p><p></p><p>In this thread, there are two key terms DoS and DDoS, which stands for Denial of Service, in our opinion - Denial of Service. Now I will try to explain in simple words what it is.</p><p>The purpose of the Ddos attack is to "kill" the server, thereby making the site inaccessible or difficult to access for ordinary visitors. They lay down servers by overloading them, since each server has a certain capacity and a limited amount of memory that can handle a limited number of requests.</p><p></p><p>When using DDoS attacks, more requests are sent to the server than it can handle, then the site crashes or responds very slowly. The consequences are obvious. Broken site = loss of money and nerves by the owner.</p><p></p><p>The main difference between DOS and DDoS attacks is that DDoS attacks are executed simultaneously from a large number of computers, which allows attacking larger and more secure systems. But where do you get this large number of microwaves? Respectable colleagues of the DDoser have already taken care of this, happily infecting tens of thousands of computers of ordinary people with Trojans using social engineering and other techniques. Now all these devices are under the control of cybercriminals, and the owners are not even aware of anything. Trojan horses run in the background turning the device into a so-called zombie computer, which is under the control of hackers and is part of their zombie army.</p><p></p><p>If you look deeper, then DDoS attacks have many types, depending on the object of the attack. The most popular and classic one is Flood - overflow of system bandwidth. That is, an attack with a large number of meaningless or incorrectly formulated requests.</p><p>There are also many such attacks - from ordinary HTTP and Ping floods to more sophisticated Smurf attacks. Other interesting attacks include sending "heavy" requests - which strain the processors, overwhelm the server with log files, which will clog the entire hard disk later, as well as a fake attack of the second kind, which causes a false response of the protection system, which itself blocks the resource.</p><p></p><p>But in order to understand well all the subtleties and nuances of these attacks, you need to understand the principles by which the servers themselves function. Therefore, vote with your like and we will analyze this topic.</p><p></p><p>Let's summarize the intermediate results in order to assimilate the above information. DDoS attack is when many zombie computers send a bunch of requests to the server of a certain resource and force it to deny service. There are many types of DDoS attacks, which provides a powerful toolkit for hackers and allows them to find the right "key" to any door, and without leaving evidence.</p><p></p><p>This is why they are so popular and dangerous. But the question still remains open why people do it. Can't you just live together and enjoy the benefits of the Internet together? There are several reasons for this.</p><p></p><p>The grievance that led to one of the first well-known DDoS attacks on the FBI's Web sites in 1999, which put them on hold for weeks. And all because of the FBI raids on hackers. The political stance that made Wikileaks cancer and a whole bunch of government sites go wrong. The desire to make money, the consequence of which is custom-made DDoS attacks on the competitors of large companies, because in big business all means are good.</p><p></p><p>But the most repulsed hackers arrange attacks for no reason at all. As the saying goes: "Just for fun". Well, they like to watch how it "everything burns."</p><p></p><p>But there have been attacks in our history so large-scale that they have affected millions of people and generally endangered the entire modern Internet. They were trumpeted by all the world's media and we could not but share with you. One of the first was a major DDos attack organized by a 16-year-old schoolboy. Perhaps, just because of her, a similar destructive type of activity has become often associated with schoolchildren.</p><p>A dude with the nickname Mafiaboy for several weeks, with the help of 50 networks, put the sites of CNN, Ebay and Amazon. Our protagonist was lucky to avoid serious punishment just because he is not an adult. He received a condition and, for sure, the young talent was immediately recruited into cybersecurity.</p><p></p><p>The next case and even cases are related to the Anonymous group, about which, by the way, we have almost prepared the material, which you can check out soon. They are responsible for hundreds of DDos attacks, each of which is amazing in its scale. That's why they are the most famous hackers of our time.</p></blockquote><p></p>
[QUOTE="Ghosthunter, post: 559, member: 6"] [IMG alt="34b6ed73956edb4c6eba8.png"]https://telegra.ph/file/34b6ed73956edb4c6eba8.png[/IMG] Well, usually a few men gather in a dark room that is illuminated only by the light from the screens, or a cheap neon. Mandatory attributes: everyone in the room must wear a Guy Fawkes mask, because we are for complete anonymity. The dress code is dark jeans and a plain hoodie. And for the entourage, we can add gloves with cutouts for the fingertips. The number of monitors is automatically multiplied by x4 based on the number of hackers, a bunch of incomprehensible wires sticking out of the system blocks, and one flash drive with an inaccurately glued sticker on which says "never play this". Next to the computers is an empty pizza box and an unpacked redbull block. Everything seems to be ready. It remains to determine, Whose usual life from today will forever change? Perhaps the victim will be an unsuspecting clerk from the London Stock Exchange, or a popular blogger, and perhaps even Donald Trump himself. And if you bend the whole world at once and hack the servers of the Federal Reserve System? Then the effect is difficult even to imagine. And if you try to do something good? For example, hack the accounts of some terrorists from Igil or sites that distribute child pornography. Then we will definitely become heroes in the eyes of the public. But, our protagonists choose a very mundane goal. How about hacking GitHub. What for? Just like that! We conduct brainstorming and analytical work. We find vulnerabilities and determine the best tool. And here it is. The DDos attack begins. I hope you managed to completely immerse yourself in the atmosphere of hacker romance and a lot of interesting things await us ahead. But first, a little history and familiarity with the terms. The history of hacker attacks began almost from the very beginning of the launch of the Internet, because as we know, if there is a system, then there will always be craftsmen who will certainly want to break it. The first type of hacker attacks is considered to be such a thing as mailbombing or the bombing of email addresses. As soon as e-mail was widely used in large companies in the mid-90s, the ancestors of modern hackers came up with an uncomplicated way to complicate the life of ordinary or not very ordinary plankton. And the essence of the method was in banal spam. A lot of meaningless letters were sent to the mailbox of a particular person, which made it impossible to work with the mailbox itself. Roughly speaking, there were so many letters that a person could not find real ones among them and fell into a binge. Such attacks, of course, were carried out from anonymous mail servers, because of which the mail provider could not identify the real sender and limit the number of letters. Nowadays, of course, email clients have become an order of magnitude smarter, so this method has become less relevant, but nevertheless, it has fulfilled its fundamental role in the hacker craft. With the development of the Internet, heaps of new attack methods have emerged, such as buffer overflows, the spread of viruses, worms and Trojans, social engineering, and more. But each of them deserves a separate material on our channel, so we will focus on the topic that interests the absolute majority. A topic that has become the main argument and punitive weapon of any self-respecting schoolboy-paladin, whose goal is to fight against everything unscrupulous, or just for the sake of entertainment and feeding his own Ego. As you may have guessed, we are talking about a DDoS attack, which has unlimited power in terms of position on the blades of the website of your native school or even your favorite Netflix service. In this thread, there are two key terms DoS and DDoS, which stands for Denial of Service, in our opinion - Denial of Service. Now I will try to explain in simple words what it is. The purpose of the Ddos attack is to "kill" the server, thereby making the site inaccessible or difficult to access for ordinary visitors. They lay down servers by overloading them, since each server has a certain capacity and a limited amount of memory that can handle a limited number of requests. When using DDoS attacks, more requests are sent to the server than it can handle, then the site crashes or responds very slowly. The consequences are obvious. Broken site = loss of money and nerves by the owner. The main difference between DOS and DDoS attacks is that DDoS attacks are executed simultaneously from a large number of computers, which allows attacking larger and more secure systems. But where do you get this large number of microwaves? Respectable colleagues of the DDoser have already taken care of this, happily infecting tens of thousands of computers of ordinary people with Trojans using social engineering and other techniques. Now all these devices are under the control of cybercriminals, and the owners are not even aware of anything. Trojan horses run in the background turning the device into a so-called zombie computer, which is under the control of hackers and is part of their zombie army. If you look deeper, then DDoS attacks have many types, depending on the object of the attack. The most popular and classic one is Flood - overflow of system bandwidth. That is, an attack with a large number of meaningless or incorrectly formulated requests. There are also many such attacks - from ordinary HTTP and Ping floods to more sophisticated Smurf attacks. Other interesting attacks include sending "heavy" requests - which strain the processors, overwhelm the server with log files, which will clog the entire hard disk later, as well as a fake attack of the second kind, which causes a false response of the protection system, which itself blocks the resource. But in order to understand well all the subtleties and nuances of these attacks, you need to understand the principles by which the servers themselves function. Therefore, vote with your like and we will analyze this topic. Let's summarize the intermediate results in order to assimilate the above information. DDoS attack is when many zombie computers send a bunch of requests to the server of a certain resource and force it to deny service. There are many types of DDoS attacks, which provides a powerful toolkit for hackers and allows them to find the right "key" to any door, and without leaving evidence. This is why they are so popular and dangerous. But the question still remains open why people do it. Can't you just live together and enjoy the benefits of the Internet together? There are several reasons for this. The grievance that led to one of the first well-known DDoS attacks on the FBI's Web sites in 1999, which put them on hold for weeks. And all because of the FBI raids on hackers. The political stance that made Wikileaks cancer and a whole bunch of government sites go wrong. The desire to make money, the consequence of which is custom-made DDoS attacks on the competitors of large companies, because in big business all means are good. But the most repulsed hackers arrange attacks for no reason at all. As the saying goes: "Just for fun". Well, they like to watch how it "everything burns." But there have been attacks in our history so large-scale that they have affected millions of people and generally endangered the entire modern Internet. They were trumpeted by all the world's media and we could not but share with you. One of the first was a major DDos attack organized by a 16-year-old schoolboy. Perhaps, just because of her, a similar destructive type of activity has become often associated with schoolchildren. A dude with the nickname Mafiaboy for several weeks, with the help of 50 networks, put the sites of CNN, Ebay and Amazon. Our protagonist was lucky to avoid serious punishment just because he is not an adult. He received a condition and, for sure, the young talent was immediately recruited into cybersecurity. The next case and even cases are related to the Anonymous group, about which, by the way, we have almost prepared the material, which you can check out soon. They are responsible for hundreds of DDos attacks, each of which is amazing in its scale. That's why they are the most famous hackers of our time. [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
DDOS Attacks and Hackers
Top