OcUK DDoS attack - £10,000 reward

Status
Not open for further replies.
Soldato
Joined
5 Dec 2006
Posts
15,370
Trawl through server records, make a list of all the IP addresses and host names for the computers responsible and then contact their ISPs.
 
Soldato
Joined
31 Oct 2005
Posts
8,793
Location
Leeds
Don't normally get involved in these sort of things, I don't have any information but Wow quite serious,

I've noticed the forums and shop being bad, must be costing you a fortune..

Hope its sorted
 
Soldato
Joined
10 Sep 2008
Posts
11,973
Location
Bangor, Northern Ireland
Definition of DDOS Attck for all you people.

On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
A hacker (or, if you prefer, cracker) begins a DDoS attack by exploiting a vulnerability in one computer system and making it the DDoS "master." It is from the master system that the intruder identifies and communicates with other systems that can be compromised. The intruder loads cracking tools available on the Internet on multiple -- sometimes thousands of -- compromised systems. With a single command, the intruder instructs the controlled machines to launch one of many flood attacks against a specified target. The inundation of packets to the target causes a denial of service.

While the press tends to focus on the target of DDoS attacks as the victim, in reality there are many victims in a DDoS attack -- the final target and as well the systems controlled by the intruder.

Im assuming it will be nigh on impossible for us mere mortals to find out who is behind it.
 
Permabanned
Joined
14 Nov 2002
Posts
5,555
Location
Kent
Trawl through server records, make a list of all the IP addresses and host names for the computers responsible and then contact their ISPs.

For all you know, your PC could be one of them :p They will be compromised home user PCs for the most part.

Did you get it on with the lovely "lady" on MSN by the way? :D
 
Man of Honour
Joined
13 Oct 2006
Posts
91,147
I'm guessing Spie is asking for people who know and can help prove the person responsible? After all without server logs and various other details there's no much one could discover 'cold'.

Even with the server logs you'd have to infiltrate the botnet which would take a lot of time and experience to find the controlling connections and then infiltrate that and you can bet they are routed via a couple of anon proxies or other compromised machines.

Even if you traced back the botnet and took out the controller (which would probably stop the attacks although the zombies are probably in "fire and forget" mode) you'd have a hard time tracing it back to the original perpetrator - unless they paid someone with their own account to inititate the attack and if they are the original initiatior rather than hiring someone else if they are smart they would have used a hijacked wireless connection. And this isn't even scratching the surface of the possibilities.

I hope someone in the know rats the person out for the money personally.
 
Status
Not open for further replies.
Back
Top Bottom