Jump to content

ThaDoctah

PC Member
  • Posts

    106
  • Joined

  • Last visited

Posts posted by ThaDoctah

  1. There's the "silver" or WTF it is that you have to buy with real money.  It's the only thing you can buy anything with that's worth having.  Then there are "credits" with which you can buy a very limited amount of crap, such as BLUEPRINTS, but you can't buy the parts to build what is on the blueprint, you have to get  lucky and find the crap, which seems to be fairly rare.

    No, you do not have to spend plat on anything. You can buy Blueprints, yes. What do you mean get lucky on the parts? Ya mean prime? Yeah, instant gratification doesn't make a game fun. If you're not willing to work towards anything then don't play games.

  2. Spoofing ICMP packets can be considered a form of DDoS because it causes multiple systems to flood the target. It's initiated from one computer though. I mean technically it's a DRDoS but whatever 

    IMCP packets are hardly a threat anymore, but spoofing packets doesn't make other computers start attacking, from what I read in your post, that's what you're saying.

  3. Multiple people. Or a single person in control of multiple computer systems with different IPs to launch the attack with.

    Could also be 1 system using DNS reflection to seem like multiple (which is hard to mitigate).

  4. In this case, It's either another company which is trying to harm DE / weaken their security in order to actually hack valueable information (usually happens when a money institue's server gets ddos'd)....

     

    Or what I think: Some butthurt Player who got banned gets revenge by ddos'ing.

     

    Unfortunately it IS that easy.

     

    And it's quite hard to do something against it, because the server doesn't know which multible request ID's (IP adresse) come from the same person.

     

     

    phew,... at least that's what I learned.

     

    Overloading a server to the point it is unreachable isn't the best way to access the server I'd think.

  5. These people are using a botnet, a group of computers connected to one computer, and are rapidly sending in packets at a speed that overloads just enough to kill the login and saving features. 

    Not necessarily true. There is a method which can involve 1 server with a high upload speed and hundreds of other servers known as DNS servers. For example: Google DNS, Open DNS, etc. But only certain DNS servers are vulnerable to this method of attack, because they respond to the requests. Here's how it works:

     

    Server A: Attacker Server

    Server B: DNS Server

    Server C: Victim Server

     

    --

     

    Server A has an IP of 1.1.1.1, Server B has an IP of 2.2.2.2, and server C has an IP of 3.3.3.3.

    1. Server A sends 65 bytes of data in multiple requests a second (say a few MB/s) spoofing the IP 2.2.2.2

    2. Server B gets the data and responds to the request.

    3. Server C receives data from Server B repetitively.

     

    --

     

    Now, Server A would have a LOT of DNS resolvers like Server B on hand to take advantage of this. This means a lot of requests with Server C's IP and multiple DNS resolvers.

     

    Here's an article on CloudFlare and their mitigation of a 75Gbps attack (75Gbps = 9.375GBps).

     

    http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho

  6. Basically, think of this. A server only has 50 megabytes (a second) upload speed. Now, the attacker, has 100 megabytes (a second) upload speed. The attacker can then use the entire pipe to send MOST of their data to the server, but the thing is, the server can't handle all the data, and is struggling to process it. That basically means while it's going offline, it's trying to process the data fullspeed, because there's so much of it, they need to push it out of the pipe. It's then causing a clog that halts the network from working.

×
×
  • Create New...