IP Address: 127.0.0.1 Reverse DNS:** server can't find 1.0.0.127.in-addr.arpa: SERVFAILHostname: localhostLookup IP Address Location For IP: 127.0.0.1Continent:Europe (EU)Country: Unknown Capital:StockholmState:Stockholms Lan NICE PROXY ;)
At 27:00 he mentions 'Anycast.' Anycast is still around protecting networks from DDOS attacks. It's still imperfect, yet it apparently still works in the same manner. And yeah, I am catching up some on my cyber stuffs.
Simply a NTP attack these are as easy as anything scan for the open lists on the server with another tab open attacking, scanning for lists takes a few days but results are extreme
Primal 101 Nope, you'd need atleast 200 gbps of raw power to take down one cloudflare protected server, and i'm talking about raw power, and 200 gbps is not easy to get, sure there are stressers, but these tools can mostly only hit off home connections.
Someone should create a cyclic DDoSer that basically nukes every open resolver based on this list, with some of the packet information being a "you're running an open resolver, see this link for more" and then basically have that link be instructions on how to close their resolver, essentially as a mechanism of hard peer pressure to get as many open resolvers to a closed status as possible. And if you disagree, I understand, but vast problems require respectively equal drastic measures.
127.0.0.1 is always a loopback address. 192.168.0.1 isn't always the router. I think Cisco defaults to 192.168.1.1 and they can be manually changed. Yeah same concept though, I said it ironically.
Chris Fischer Read this for a good example of when it's happened in the past... archive.wired.com/wired/archive/11.07/slammer.html "Slammer's attack was ruthless and quick, spreading hundreds of times faster than the Code Red virus or Nimda worm. Yet it started with a single killer packet. The tiny worm hit its first victim at 12:30 am Eastern standard time. The machine - a server running Microsoft SQL - instantly started spewing millions of Slammer clones, targeting computers at random. By 12:33 am, the number of slave servers in Slammer's replicant army was doubling every 8.5 seconds. By 12:45 am, huge sections of the Internet began to wink out of existence. Net Access Corporation, one of the Northeast's largest ISPs, sent out an early SOS: "Nearly half our ports are in delta alarm right now." Up on the big screen, Maresh could see backbone carrier Level 3's transcontinental chain of routers trying to find working paths to the rest of the world - and failing. Three hundred thousand cable modems in Portugal went dark, and South Korea fell right off the map: no cell phone or Internet service for 27 million people. Five of the Internet's 13 root-name servers - hardened systems, all - succumbed to the squall of packets. Corporate email systems jammed. Web sites stopped responding. A Linux specialist in Manhattan spammed his colleagues in uppercase to make it clear he was screaming: "MS SQL WORM IS DESTROYING INTERNET - BLOCK PORT 1434!" But by then Slammer had knocked out more than just the Internet. Emergency 911 dispatchers in suburban Seattle resorted to paper. Continental Airlines, unable to process tickets, canceled flights from its Newark hub."
I wonder is it possible to use alternative router if the original was under attack or some critical packet loss, like uninterruptible power supply unit ? So just switch to an another source of the ethernet. I mean "ups" is existing, why there is no "uis"
There is, and they use it. But if it's an attack then the attacker is also using the uis so what's the point? Analogy: you have redundant power supplies and someone plugs in 1000 space heaters, blowing the fuse. The power supply switches over, and they're still plugged in, so that fuse blows too
is there anyway a large gameserver like gta 5 on psn could be ddos'd? what kind of ddos protection do they have? i know theyre servers are always going down for no reoson is it possibly ddos?
cybybybybybybybbybyb Are you a dumbass or something? A VPN is made by a company, not a criminal. If you take as server down as big as that they will trackdown th IP, and eventually find out it's a VPN. Then they will go to the company and ask them who was using that server, and them being a company will immediately give up where you live. And bam, you're in prison for 10 years.
cybybybybybybybbybyb Look it up, I'm not completely sure but they will find out. It's happened so many times before and if they're not found imediatelly it will be sometime within the next two years. If you really want to be safe, use a botnet. But even that has major risks.
One time I had a backdoor on my computer, and it came with a virus that took the name of CloudFlare, while the hacker that put the virus on my computer DDoSes me every few hours. No joke, I did have problems with them because of it.
This is why singleplayer mode still is the best choice for a game developers. Lans is almost dead, but I think "private" or "vip" lans could be a good alternative of the common internet. Internet became boring or better to say is an experimental place to clown out everybody
Technically developers could embed vpn client into the game so that all your traffic would go as if alk of you are on the same LAN. But that might lead to other vulnerabilities
@@adrianalexandrov7730 of course VPN. But its isn't legal for a competitive gaming like cybersport games, like StarCraft 1 or Warcraft3 classic or some sh*tty Dota and alternatives like LoL or HoN. The World internet will be cut into two pieces West and East segment, probably gaming will be segmented as well, at least i already predicted this variant for my future gaming platform
@@adrianalexandrov7730 oh, no problem, I was a pro gamer back in 20 years. I won Samsung Golden Cup in 2003 in Minsk in a nomination 1v1 "Reign of Chaos". It was a lan tournament. Two Ukrainian players where in a finals, because I was born in Ukraine !
@@pavelyankouski4913 wow, that's impressive. And thanks for the insight those kind of vulnerabilities hit gamers as well. P.S. Glory to Ukraine! As much as it costs from a guy born in Russia...
Guys i will tell you how to secure from ddosers this doesnt work for web but it works for pc so ok if you want to secure your network you need to configuard your network that you need to enter first mac_version this isint mac windos.i mean when you confirm the network the ddoser will have no access to ddos you his sent packets will disable it but if you buy roater and dont configuard it when you join mc.cs. or some web or game the owner will have your ip and he can ddos you and turn of your network.so i mean you need first to know how ddos works to protect you self
I have read this about 15 times and i still don't know what you mean. Nor do i think what you mean is necessarily true :P I think what you mean is - configure your network to only allow specific MAC addresses. This won't help against any kind of DoS attacks, it just means you're better protected from hackers who want to compromise your internal network (As they would have to spoof an authorized MAC). If you want to protect yourself from a DDoS attack, you essentially want to prevent people from getting your IP. There's a variety of ways to do that, one of which is getting a nice VPN. If i misunderstood what you were trying to say, i'm sorry, but you're kind of hard to understand :P