Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact us.

Post New Thread Reply

Register GFY Rules Calendar
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed.

 
Thread Tools
Old 07-03-2003, 05:24 AM   #1
ThePornGuy
Confirmed User
 
Join Date: Mar 2003
Posts: 275
Silvercash updates

Any news?
ThePornGuy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 05:25 AM   #2
reynold
Too lazy to set a custom title
 
Join Date: Oct 2002
Location: Global Traveler
Posts: 51,271
No.
reynold is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 05:27 AM   #3
Stallion
Confirmed User
 
Stallion's Avatar
 
Industry Role:
Join Date: Jan 2001
Location: FL
Posts: 6,632
Getting pretty sad. 3+ days of constant downtimes.
Stallion is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 05:32 AM   #4
extreme
Confirmed User
 
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
Could be really hard to fight of a big DDOS attack.
extreme is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 05:32 AM   #5
ThePornGuy
Confirmed User
 
Join Date: Mar 2003
Posts: 275
Who are they being attacked by and why?
ThePornGuy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 06:04 AM   #6
lil2rich4u2
ICQ: 175171926
 
Join Date: Oct 2002
Location: New York, NY
Posts: 11,046
I have switched all my traffic to another sponsor, no time for this.

When they are back up for a while i will consider them again.
__________________
HEY!!

Unbeatable hosting! Customer service is top notch!

--> ISPrime <-- Do a search on any board, their reputation is rock solid .. for years!!
lil2rich4u2 is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 06:16 AM   #7
web4x
Will everyone please review my newest site?
 
Join Date: May 2002
Posts: 841
Fuck they are down again. Seems like they can't fight the DOS attacks.

I redirected my traffic to another sponsor.
__________________
web4x is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 06:19 AM   #8
ThePornGuy
Confirmed User
 
Join Date: Mar 2003
Posts: 275
I'd like to stick it out with them. It would be a major pain in the ass to switch but some info would be nice.
ThePornGuy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 06:50 AM   #9
sexxx
Confirmed User
 
Join Date: Aug 2001
Location: P
Posts: 101
LA Mike posted on the Silver board earlier today, they were attacked from hundreds of servers to their secure joinforms. They have bought and installed new firewalls yesterday.

It was up and running 7-8 hours ago, but it seems like they are attacked again today.......
sexxx is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 07:17 AM   #10
Rick Latona
The Best Ideas Start Here
 
Join Date: Dec 2002
Location: Atlanta
Posts: 6,037
I can tell you from my experience in the hosting business that these attacks are very difficult to defend. I wish them the best of luck.
__________________
Regards,

Rick Latona
http://latonas.com

Latona's - We Sell Money Making Web Properties
Note to buyers of websites and traffic: please check our inventory at http://latonas.com/websites-for-sale. If you would like to make an offer on something, just let me know.
Rick Latona is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 07:57 AM   #11
jimmyf
OU812
 
Join Date: Feb 2001
Location: California
Posts: 12,651
what the heck is going on all these attacks, GFY, AWI, SpamCop, SilverCash, and some in Europe. AWI is still down
__________________
Epic CashEpic Cash works for me
Solar Cash Paysite Plugin
Gallery of the day freesites,POTD,Gallery generator with free hosting
jimmyf is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:01 AM   #12
DrGuile
Confirmed User
 
Join Date: Jan 2002
Posts: 2,025
Quote:
Originally posted by lil2rich4u2
I have switched all my traffic to another sponsor, no time for this.

When they are back up for a while i will consider them again.
Oh no! What will silvercash do without all those hits!

__________________
LiveBucks / Privatefeeds - Giving you money since 1999
Up to 50% Commission!
25% Webmaster Referal
Powered by Gamma
DrGuile is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:01 AM   #13
El Pres
Confirmed User
 
Join Date: Aug 2002
Location: Alicante, Spain
Posts: 382
SpamCop's down.

Hmmmmm. where did I put that 8 million emails cd I bought for $19.99.
El Pres is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:04 AM   #14
jimmyf
OU812
 
Join Date: Feb 2001
Location: California
Posts: 12,651
Quote:
Originally posted by El Pres
SpamCop's down.

Hmmmmm. where did I put that 8 million emails cd I bought for $19.99.
nope they are not down now they were though off and on for a few days. At times running very SLOW. The last going on three days they were back to normal most of the time. I just save all spam with notepad and send later.
__________________
Epic CashEpic Cash works for me
Solar Cash Paysite Plugin
Gallery of the day freesites,POTD,Gallery generator with free hosting
jimmyf is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:07 AM   #15
jimmyf
OU812
 
Join Date: Feb 2001
Location: California
Posts: 12,651
Quote:
Originally posted by sexxx
LA Mike posted on the Silver board earlier today, they were attacked from hundreds of servers to their secure joinforms. They have bought and installed new firewalls yesterday.

It was up and running 7-8 hours ago, but it seems like they are attacked again today.......
Looks like I can't get to there board even.

http://www.silvercash.com/affiliate/members/home/

The page cannot be displayed
The page you are looking for is currently unavailable.
The Web site might be experiencing technical difficulties,
or you may need to adjust your browser settings.
__________________
Epic CashEpic Cash works for me
Solar Cash Paysite Plugin
Gallery of the day freesites,POTD,Gallery generator with free hosting
jimmyf is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:14 AM   #16
El Pres
Confirmed User
 
Join Date: Aug 2002
Location: Alicante, Spain
Posts: 382
Quote:
Originally posted by jimmyf
nope they are not down now they were though off and on for a few days. At times running very SLOW. The last going on three days they were back to normal most of the time. I just save all spam with notepad and send later.
I was joking.
El Pres is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:42 AM   #17
extreme
Confirmed User
 
Industry Role:
Join Date: Oct 2002
Location: lalaland
Posts: 2,120
works now

edit: very slow though :].

Last edited by extreme; 07-03-2003 at 08:46 AM..
extreme is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 08:46 AM   #18
basschick
Confirmed User
 
Join Date: Jan 2001
Location: el lay, ca usa
Posts: 2,540

still down for me
basschick is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 10:06 AM   #19
LA Mike
Confirmed User
 
Industry Role:
Join Date: Jul 2001
Location: Orange County, CA
Posts: 3,056
We are continually working on it guys. I dont know what else to say but sorry. We havent slept in days and we have put up some of the best firewalls and routers and continue to battle.

I will keep you updated.
LA Mike is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 10:49 AM   #20
rastakit
Confirmed User
 
Join Date: Nov 2002
Location: Father's office
Posts: 207
Perhaps this is the beginning of the DOS Hacker Olympics they keep talking about?

Good luck with this Mike...have you guys thought about dumping some of the domains onto a CDN for a bit? Might be able to deflect some of the load for a while and/or tell you more about the origin of the attack...sorry if that's repetitive info...

hope you guys are up soon...
__________________
<p><a href="http://www.pornposse.com/members/join.htm">The Pre-eminent Third-party "multiplier" in the Adult Space!</a>
rastakit is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 11:54 AM   #21
fantasyman
Let's do some business together
 
Join Date: Dec 2001
Posts: 973
Quote:
Originally posted by LAMike
We are continually working on it guys. I dont know what else to say but sorry. We havent slept in days and we have put up some of the best firewalls and routers and continue to battle.

I will keep you updated.
Mike - if our techs can be of any assistance just lmk and we'll help you out if we can. Terrible how some folks want to mess with successful programs and be a nuisance......
fantasyman is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 11:59 AM   #22
BradShaw
Confirmed User
 
Join Date: Oct 2001
Location: KB's trailer
Posts: 7,840
Best of luck Mike. Back in the day, we had constant attacks from the password community, taking shit down left and right. There is no easy answer. Our silvercash links are still up as always, this is just a slight bump in the road.
__________________
Sig too big

http://www.gofuckyourself.com/gfy_faqs.html

Want to use a large banner in your sig??? Contact Eric about getting on as an advertiser - eric AT adult.com
BradShaw is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 12:00 PM   #23
smack
Push Porn Like Weight.
 
smack's Avatar
 
Industry Role:
Join Date: Mar 2002
Location: Inside .NET
Posts: 10,652
Quote:
Originally posted by rastakit
Perhaps this is the beginning of the DOS Hacker Olympics they keep talking about?

Good luck with this Mike...have you guys thought about dumping some of the domains onto a CDN for a bit? Might be able to deflect some of the load for a while and/or tell you more about the origin of the attack...sorry if that's repetitive info...

hope you guys are up soon...
this has nothing to do with hackers. this is some stupid douchebag bag that thinks he is some great hacker, but all he can do is press start on his gay ass DOS attatck program what the fuck logical purpose......like...grrrr....i dunno i just don't understand it. LAMike, good luck man.
__________________
Cry havoc and let slip the dogs of war.
smack is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 12:16 PM   #24
vending_machine
Confirmed User
 
Join Date: Jun 2002
Location: Seattle
Posts: 1,062
Quote:
Originally posted by LAMike
We are continually working on it guys. I dont know what else to say but sorry. We havent slept in days and we have put up some of the best firewalls and routers and continue to battle.

I will keep you updated.
Often times with attacks like this, simple scripting and IP blocking (putting IPs up on lo0) is both cheaper and better than expensive firewalls.

That's been my experience in the past at least.
vending_machine is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 12:20 PM   #25
Johnnyv
Registered User
 
Johnnyv's Avatar
 
Industry Role:
Join Date: Sep 2002
Posts: 75
We are staying with you Mike.

Silvercash has been an honest and lucrative partner of ours for years, and it would take more than a little down time to get us to move anything anywhere else.

Johnny V.
Johnnyv is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 01:44 PM   #26
wdsguy
Ryde or Die
 
Industry Role:
Join Date: Dec 2002
Location: California-Shanghai
Posts: 19,568
hey Mike is your upstream provider helping at all?
wdsguy is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 04:39 PM   #27
docjohnson
Confirmed User
 
Join Date: Apr 2002
Posts: 173
Mike, are all of your paysites going down along with silvercash.com? I have PPC traffic I'm sending, and I'ma have to stop the campaigns if so.
__________________
Do you need SERIOUS SEO done for competitive keywords? See if one of my three plans will fit your needs today! You may qualify for my TOP10 Guarantee! Skype me @ mrclean78
docjohnson is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 04:43 PM   #28
docjohnson
Confirmed User
 
Join Date: Apr 2002
Posts: 173
Nevermind, I answered my own question. I just checked and of the paysites are down as well....not good bro.
__________________
Do you need SERIOUS SEO done for competitive keywords? See if one of my three plans will fit your needs today! You may qualify for my TOP10 Guarantee! Skype me @ mrclean78
docjohnson is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 04:47 PM   #29
Mr.Fiction
Confirmed User
 
Join Date: Feb 2002
Location: Free Speech Land
Posts: 9,484
Here is another thread about this issue, for those that haven't read it:
http://www.gofuckyourself.com/showth...hreadid=149406

Also, we plan to stick with Silvercash through the problems. Good luck guys.
Mr.Fiction is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 04:48 PM   #30
LA Mike
Confirmed User
 
Industry Role:
Join Date: Jul 2001
Location: Orange County, CA
Posts: 3,056
Things should be normal soon... Keeping my fingers crosses. Some stuff going on that I think is going to end this thing soon.


Stay tuned
LA Mike is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 04:51 PM   #31
WiredGuy
Pounding Googlebot
 
Industry Role:
Join Date: Aug 2002
Location: Canada
Posts: 34,487
Quote:
Originally posted by Mr.Fiction
Also, we plan to stick with Silvercash through the problems. Good luck guys.
Same here, SC is a great company to work with and my traffic isn't leaving them.

WG
__________________
I play with Google.
WiredGuy is online now   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-03-2003, 05:03 PM   #32
Madball
Confirmed User
 
Join Date: May 2002
Location: Oslo, Norway
Posts: 748
I know this may be inappropaite to ask, but can some of the guys here with experience protecting their programs outline some BASIC "must have" protection against these kind of attacks together with a price tag?

This sounds very scary and I hope Silvercash can resolve this issue as soon as possible.
Madball is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 01:23 AM   #33
Terenzo
Confirmed User
 
Join Date: Jan 2002
Posts: 971
Quote:
Originally posted by LAMike
Things should be normal soon... Keeping my fingers crosses. Some stuff going on that I think is going to end this thing soon.


Stay tuned
please keep us informed here at gfy - i am still sending 7k hits a day to nowhere at the moment, i hope you guys will manage this.
Terenzo is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 01:54 AM   #34
sexxx
Confirmed User
 
Join Date: Aug 2001
Location: P
Posts: 101
It has been running nicely for a couple of hours from europe.
The servers are very fast right now :-)
sexxx is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 02:29 AM   #35
XM
Confirmed User
 
Join Date: Jan 2001
Location: SVK
Posts: 406
only couple of hours. Down again.
XM
XM is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 03:20 AM   #36
Terenzo
Confirmed User
 
Join Date: Jan 2002
Posts: 971
do you know from what servers the attacks come from? why not take them down? should not be a problem. i normally fight back with 1000hits/sec but sometimes i have to turn up to 10k. if you are afraid of legal actions against you just publish a list of host where the attacks are coming from - i am sure many pissed affiliates will fight back.
Terenzo is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 03:25 AM   #37
Petr
Confirmed User
 
Join Date: Mar 2002
Posts: 502
yeah, taking down thousands of computers, that makes sense
Petr is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 03:32 AM   #38
SR
Confirmed User
 
Join Date: Jul 2001
Location: The Netherlands
Posts: 2,239
Quote:
Originally posted by Terenzo
do you know from what servers the attacks come from? why not take them down? should not be a problem. i normally fight back with 1000hits/sec but sometimes i have to turn up to 10k. if you are afraid of legal actions against you just publish a list of host where the attacks are coming from - i am sure many pissed affiliates will fight back.
That's insane.

It's very hard to stop them.
A firewall doesn't help too much.
You need to block them before they come that far.

What I've heard is that a good traffic filter is the best solution.
There are some companies that are specialized in making systems to detect and stop heavy ddos attacks.
They cost alot but will be worth it for things like this.
Your host should know about this or call a security expert.
SR is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 04:17 AM   #39
ServerGenius
Confirmed User
 
Join Date: Feb 2002
Location: Amsterdam
Posts: 9,377
What SC is facing is known as a DDoS which means a Distributed
Denial of Service Attack. Anyone who thinks this is simple script
kiddies work is wrong.

I will try to outline in a simple way how a DDoS works and why it
is so hard to stop it.

First of all the attacker needs to hack 100's or 1000's of servers
in many different networks. Usually he picks servers that are
connected to large amounts of bandwidth. On each of the
machines he installs a server kind of program that listens to
commands from 1 central place and can launch any type of attack
on command. This can be simple webhits, or large packet streams
using multiple protocols, like ICMP, UDP or TCP/IP. For best effect
the attacker uses huge amounts of tiny packets as this causes
the maximum load possible on routers and servers.

Especially Cisco routers are known to have difficulties with HUGE
amounts of small non TCP packets. TCP/IP requires a handshake
protocol for communication whereas ICMP and UDP don't. So most
likely UDP or ICMP packet protocols are being used.

Once the attacker has a huge amount of these server type scripts
installed he can trigger all the nodes with 1 central script which will launch his attack simultaniously over all nodes. Since there are
so many nodes it's next to impossible to start blocking traffic with
a firewall. The nodes are all in different networks and use 10.000's of different IP's so it's virtually impossible to start
blocking IP's simply because there are too many. By blocking full
C-classes you will end up blocking half the internet so that's no
option either.

Using access-list filters on core routers is a bad idea because it
would create such a load that the routers will run out of memory
within seconds. Core routers switch gigabytes of traffic per
second so filtering it there is very bad idea. The router should
read each packet and compare it to a ruleset to see if it can be
forwarded or dropped.

The attack can be simple webpage hits, so it's very hard to
determine which packets are fraudulant and which not. With a
huge number of servers you can flood almost any server quite
easily.

The best way to handle DDoS attacks is with your upstream provider. Look at the traffic and write down from which core
networks the attacks are coming. Call those carriers and give
them the IP nets from which the attacks are coming. They can
either stop advertising those IP networks or contact RIPE/ARIN/SARIN to take action.

The solution in stopping the attack is not so much technical.
Understanding what's going on and determing where it comes
from and then getting up to the carrier that controls those IP nets
is where you can do something.

Mike I have a lot of experience with this stuff. I'm sure you have
really good people around you. In case you can use extra help
feel free to hit me up. As I tried to explain determing source nets
is the key to your problem.

DynaMite
UIN# 370820
__________________
| http://www.sinnerscash.com/ | ICQ: 370820 | Skype: SinnersCash | AdultWhosWho |
ServerGenius is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 04:24 AM   #40
Shog
Registered User
 
Join Date: Jul 2003
Location: Rocklin, CA
Posts: 14
The attacks can vary, you can't have complete protection against this type of attack.

Distributed denial of service attacks, are very powerful, and much more widespread these days, because windows computers can now participate in them, which wasn't always the case.

Windows now has 'raw sockets' support which makes IP spoofing possible, so if a 2,000 windows botnet is all pumping garbage packets to a single server with fake source IPs, you pretty much are out of options for tracing, the only way of tracing is by tracking a single stream of data to the router they are coming from, 1 hop at a time, which is virtually impossible to get that kind of cooperation with every hop unless your the FBI.

The attack a while back that went against ebay and yahoo was the same type of attack, using a unix variant, called trinoo, which is the same type of attack, except required rooted unix boxes to orcestrate since unix has had raw socket support forever, though required less servers because unix servers tend to be well connected.

The tools available to create these types of attacks now days are much easier to get into windows boxes then unix boxes.

http://grc.com/dos/grcdos.htm is a very good resource for info.

I have been receiving distributed denial of service attacks for about 9 months to a small site of my own off and on. After getting the server to be able to detect and cope with the volume of traffic to survive the hit, I still had a extreme volume of traffic coming into the server, which costs in bandwidth, so what I have done is setup round-robin DNS for my site, and when a attack comes in, block my own IP that is getting hit at the ISP, and legitimate traffic will flow to the other IPs. With a low DNS TTL this has been very effective. I also remove the attacked IP out of round-robin DNS when an attack is detected to minimize round-robin connect failures until the TTL's expire.

Routers at ISPs have a setting they can set that would prohibit a spoofed packet to leave the ISP, packets could only be spoofed within the subnets they are routing for, many many many ISPs don't have this 'egress filtering' turned on. If a attack could be traced back to a real IP, the victim can get ahold of a botnet client on a infected computer, disassemble it to find out what central resource it's connecting to, then go to the provider of that central resource and get it shut down. Many botnets are coded with hostnames hosted off free web based DNS services so the botnets can be administrated easier, giving the attacker the ability to move the bots to different IRC servers. Getting that central hostname out of a single attack bot will disable a botnet assuming they don't have a alternative way into the drone computers.

Josh
Shog is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 04:27 AM   #41
Mr.Fiction
Confirmed User
 
Join Date: Feb 2002
Location: Free Speech Land
Posts: 9,484
Quote:
Originally posted by Shog
The attacks can vary, you can't have complete protection against this type of attack.

Distributed denial of service attacks, are very powerful, and much more widespread these days, because windows computers can now participate in them, which wasn't always the case.

Windows now has 'raw sockets' support which makes IP spoofing possible, so if a 2,000 windows botnet is all pumping garbage packets to a single server with fake source IPs, you pretty much are out of options for tracing, the only way of tracing is by tracking a single stream of data to the router they are coming from, 1 hop at a time, which is virtually impossible to get that kind of cooperation with every hop unless your the FBI.

The attack a while back that went against ebay and yahoo was the same type of attack, using a unix variant, called trinoo, which is the same type of attack, except required rooted unix boxes to orcestrate since unix has had raw socket support forever, though required less servers because unix servers tend to be well connected.

The tools available to create these types of attacks now days are much easier to get into windows boxes then unix boxes.

http://grc.com/dos/grcdos.htm is a very good resource for info.

I have been receiving distributed denial of service attacks for about 9 months to a small site of my own off and on. After getting the server to be able to detect and cope with the volume of traffic to survive the hit, I still had a extreme volume of traffic coming into the server, which costs in bandwidth, so what I have done is setup round-robin DNS for my site, and when a attack comes in, block my own IP that is getting hit at the ISP, and legitimate traffic will flow to the other IPs. With a low DNS TTL this has been very effective. I also remove the attacked IP out of round-robin DNS when an attack is detected to minimize round-robin connect failures until the TTL's expire.

Routers at ISPs have a setting they can set that would prohibit a spoofed packet to leave the ISP, packets could only be spoofed within the subnets they are routing for, many many many ISPs don't have this 'egress filtering' turned on. If a attack could be traced back to a real IP, the victim can get ahold of a botnet client on a infected computer, disassemble it to find out what central resource it's connecting to, then go to the provider of that central resource and get it shut down. Many botnets are coded with hostnames hosted off free web based DNS services so the botnets can be administrated easier, giving the attacker the ability to move the bots to different IRC servers. Getting that central hostname out of a single attack bot will disable a botnet assuming they don't have a alternative way into the drone computers.

Josh
Damn, that's a serious first post.
Mr.Fiction is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 04:36 AM   #42
ServerGenius
Confirmed User
 
Join Date: Feb 2002
Location: Amsterdam
Posts: 9,377
Quote:
Originally posted by Mr.Fiction


Damn, that's a serious first post.
Yup it is and it's spot on. The egress filter is a good option if the
packets are really spoofed. If the attacker is in control of many
different servers then it gets harder as the packets are real
packets and are not being forged.

There are so many bad secured servers on the internet that it's
quite easy to root boxes and gain control while being completely
stealth. LRK, Adore Kernel Plugin, Known exploits make it easy to
install stuff on servers and be completely hidden. Many times the
administrators never notice that their box has been compromised.

They upload new versions of popular system programs like:
ls, netstat, ps, pstree, slocate, traceroute, w, who, cp, mv,
kill, killall, ping, etc, etc which won't list any connections/scripts
that are being used by the hacker. These modified system
programs have the exact same filesize and timestamp as the
original ones that were installed on the server so they are quite
hard to find.

DynaMite
__________________
| http://www.sinnerscash.com/ | ICQ: 370820 | Skype: SinnersCash | AdultWhosWho |
ServerGenius is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Old 07-04-2003, 04:57 AM   #43
Carrie
Confirmed User
 
Join Date: Apr 2002
Location: Virgin - nee
Posts: 3,162
Mike, I know you guys will spare no expense in getting this taken care of - might I suggest that you contact Steve Gibson and bring him on board as a consultant during this attack?
He commonly deals with DDOS attacks and pulls them apart and finds a way to stop or deflect them.
The closest associated emails I can find [email protected] and [email protected] and a phone number of 714-362-8800.
Also definitely take a look at the IPs that the attacks are coming from (you should be able to take apart the attacks and determine if they're spoofed and what the true addy is) and start contacting the owners of those IPs. IE, if any of these attacks are coming from servers on the Rackshack network, send a captured sample of the attack to [email protected] and these emails:
Patrick [email protected] Sen. Sys. Admin
Mario [email protected] Customer Service Manager
Greg [email protected] Support Team Manager
Robert [email protected] Rackshack CEO

and give them a call. Rackshack will be happy to investigate it on their end and start unplugging boxen (although I must say, if they notice any of their servers sending out abnormal amounts of packets like this, they'll unplug them on their own).


I'd like to add to the discussion that it doesn't take a genius or a serious cracker to do this. One patient person with the right script and a list of IPs from a cable provider (like RoadRunner or Cox) can rack up insecure windows boxes left and right. Then the boxes open a connection to an irc chat room where they wait for their marching orders.
Once the orders come in, the boxes all start sending traffic to the victim... and the owners of these computers on cable connections aren't even aware of it. Full-time "always on" connections with nice fat pipes and thousands of insecure boxen blindly following orders - ugh.
The guys can also employ true servers in the attack, and it's the same for that, just running a script that searches for insecure boxen and then goes in and buries itself to await orders.

I assume that this attack is from that Deepsy guy?
Carrie is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote
Post New Thread Reply
Go Back   GoFuckYourself.com - Adult Webmaster Forum > >

Bookmarks



Advertising inquiries - marketing at gfy dot com

Contact Admin - Advertise - GFY Rules - Top

©2000-, AI Media Network Inc



Powered by vBulletin
Copyright © 2000- Jelsoft Enterprises Limited.