PServers getting ddossed?

05/29/2011 10:41 _Emme_#31
Quote:
Originally Posted by ChingChong23 View Post
wrong, as Emme said, it's x amount of computers attacking your target, not you. nowhere does any of your information pop up.
Still, you're never 100% protected as you have some connection with the hosts when you decide to launch an attack, but the chances of that happening while ddosing an co pserver is very, very low.
05/29/2011 11:28 ImmuneOne#32
Quote:
Originally Posted by ChingChong23 View Post
wrong, as Emme said, it's x amount of computers attacking your target, not you. nowhere does any of your information pop up.
Do you truly think the one doing this is anywhere near capable of the description Emme gave? As far as I know the idiot doing this is asking money to stop on MSN.
05/29/2011 13:15 _Emme_#33
Quote:
Originally Posted by ImmuneOne View Post
Do you truly think the one doing this is anywhere near capable of the description Emme gave? As far as I know the idiot doing this is asking money to stop on MSN.
Msn? Lol.
As msn is a peer-to-peer network, you'll get the IP-address via netstat -n and sort the ipaddresses by the port msn uses, 1863 I believe. Idiots these days..
05/29/2011 14:11 _DreadNought_#34
Quote:
Originally Posted by EmmeTheCoder View Post
I know what DoS and DDoS is, do you..? DDoS is often (very so) set up through a bot-net, a group of infected PCs spread all over the world is flooding the target, controlled by the main-attacker. There's no need for any proxy or such in this case, as the target will never be attacked from your IP-address.

On the other hand, you can trace one of the infected hosts and overview connections being made to it (the attacker when he launch an attack), and in this case it would be smart of you to go through a proxy or other.
Wouldn't that make it easier to track you down then?
YourPC->Bot1
PC->Bot2
PC->Bot3 etc, Wouldnt it be smarter if the infected computer go like

PC->Bot1->bot2->bot3->Bot4->Target

Because when you do PC->Bot1, PC->Bot2 they only have to backtrace your IP from one computer straight to yours, whereas if you only tell one bot to attack, it tells the next bot in the line to attack, and the next one, until theres nomore?
05/29/2011 14:33 BaussHacker#35
Quote:
Originally Posted by _DreadNought_ View Post
Wouldn't that make it easier to track you down then?
YourPC->Bot1
PC->Bot2
PC->Bot3 etc, Wouldnt it be smarter if the infected computer go like

PC->Bot1->bot2->bot3->Bot4->Target

Because when you do PC->Bot1, PC->Bot2 they only have to backtrace your IP from one computer straight to yours, whereas if you only tell one bot to attack, it tells the next bot in the line to attack, and the next one, until theres nomore?
Well normal there is a server in between.

PC -> Server -> Bots
05/29/2011 17:56 .Kinshi#36
All these posts remind me of this.
[Only registered and activated users can see links. Click Here To Register...]
05/29/2011 18:13 _DreadNought_#37
/win.
05/29/2011 23:08 _Emme_#38
Quote:
Originally Posted by .Kinshi View Post
All these posts remind me of this.
[Only registered and activated users can see links. Click Here To Register...]
Or by scoring 98-100% correct on every Cisco Network Academy tests :)


Quote:
Originally Posted by _DreadNought_ View Post
Wouldn't that make it easier to track you down then?
YourPC->Bot1
PC->Bot2
PC->Bot3 etc, Wouldnt it be smarter if the infected computer go like

PC->Bot1->bot2->bot3->Bot4->Target
You'd still have to keep some kind of connection between all bots and you (or a server of yours), as the bots won't know the addresses of all infected hosts (unless you actually send a list when you launch the attack and each bots sends it to the next one, but that's too much work really).

And for the record, all of you guys that keep saying "backtrace", have a laugh:
05/29/2011 23:37 .Kinshi#39
Quote:
Originally Posted by EmmeTheCoder View Post
And for the record, all of you guys that keep saying "backtrace", have a laugh:
Where do you think they got it from >.<
05/29/2011 23:41 _Emme_#40
Quote:
Originally Posted by .Kinshi View Post
Where do you think they got it from >.<
From the way they are using it, I get the feeling that they assume it's a real term, lol.
05/30/2011 00:20 BaussHacker#41
Be careful the cyber police is watching us.
05/30/2011 17:15 lostsolder05#42
Quote:
Originally Posted by EmmeTheCoder View Post
I know what DoS and DDoS is, do you..? DDoS is often (very so) set up through a bot-net, a group of infected PCs spread all over the world is flooding the target, controlled by the main-attacker. There's no need for any proxy or such in this case, as the target will never be attacked from your IP-address.

On the other hand, you can trace one of the infected hosts and overview connections being made to it (the attacker when he launch an attack), and in this case it would be smart of you to go through a proxy or other.
Now days it's possible to get your ip if your only hidden behind a single proxy. Plus there's loads of people who just use shells instead of a bot net. In the case of using shells (assuming your using someones booter) the only way of getting caught is for the boot owner to disclose your information (which is unlikely). Plus like Emme said earlier the chances of them bothering over DDoSing a CO server is slim.

Quote:
Originally Posted by BaussHacker View Post
Be careful the cyber police is watching us.
Oh nuz.
05/30/2011 18:00 _Emme_#43
Quote:
Originally Posted by lostsolder05 View Post
Now days it's possible to get your ip if your only hidden behind a single proxy. Plus there's loads of people who just use shells instead of a bot net. In the case of using shells (assuming your using someones booter) the only way of getting caught is for the boot owner to disclose your information (which is unlikely). Plus like Emme said earlier the chances of them bothering over DDoSing a CO server is slim.
I've been reading up on bot nets lately, and just now got familiar with shell booters. What surprises me is why not there already is a group of people building one of these? If it's any good, and they manage to spread it well - they'll have control over the entire PServer community (either crash auth/game-server or website), as the majority of the servers doesn't have good enough security nor stability.
05/30/2011 18:45 lostsolder05#44
Quote:
Originally Posted by EmmeTheCoder View Post
I've been reading up on bot nets lately, and just now got familiar with shell booters. What surprises me is why not there already is a group of people building one of these? If it's any good, and they manage to spread it well - they'll have control over the entire PServer community (either crash auth/game-server or website), as the majority of the servers doesn't have good enough security nor stability.
Spread it well? By spread i assume you mean virusing? You don't need to virus to get shells. It's basically just a web host that's been turned into a Dos'ing hub.
05/30/2011 19:25 BaussHacker#45
Quote:
Originally Posted by EmmeTheCoder View Post
I've been reading up on bot nets lately, and just now got familiar with shell booters. What surprises me is why not there already is a group of people building one of these? If it's any good, and they manage to spread it well - they'll have control over the entire PServer community (either crash auth/game-server or website), as the majority of the servers doesn't have good enough security nor stability.
You can upload shells to vulnerably sites. ^_^