OcUK DDoS attack - £10,000 reward

Status
Not open for further replies.
Associate
Joined
20 Mar 2003
Posts
2,323
Location
On the stool at the end of the bar
The longer it goes on the more traceable it is - if he'd have hit the site once for 2-3 days and left it at that, hadn't paid anyone directly and used a hijacked(unsecured)/open wireless to initiate the attack he'd be almost untraceable - but as time goes on and the attack changes vectors in reaction to security measures brought to mitigate it more and more clues and openings to identify atleast who is controlling it are left - and its very unlikely someone is coordinating a prolonged attack like this for free.

Totaly agree thus my (potentially wrong) assumption that this is beyond your average joe disgruntled customer/forum users.

In order to circumvent the security measures you need to have a certain amount of knowledge of how they work and even the order in which they would be logically applied so as to keep up the DDoS.

There is always a trail of evidence left behind any attack, it's a case of what is 'put' there to mislead and what is 'accidently' left behind
 
Permabanned
Joined
14 Nov 2002
Posts
5,555
Location
Kent
Not true depending on the router / equipment you are using.

At the most, all you'd get in the logs that would be useful would be the hijacker's MAC address, and that could easily have been changed to something bogus anyway in the NIC settings?
 
Associate
Joined
18 Oct 2002
Posts
2,367
It would relate back to the machine they used. Yes its simple to spoof it but most joe bloggs using someone elses wireless connection wouldnt be doing it. Professionals on the other hand would have course do it.
 
Soldato
Joined
20 Oct 2004
Posts
13,062
Location
Nottingham
Trace the mac address back to its machine and you have who was accessing the wireless network.


Is there a giant MAC address DB we can do a look up on that just pops the chaps name and address out ? or would we need to go looking at every network card in the world, cause if we need to do that we need to start soon. They are making new ones almost every day
 
Soldato
Joined
29 Sep 2005
Posts
9,128
Could it be anonmous? They pull big stuff like this all the time don't they? But I can't think of a single reason why they would do it? Unless Spie is a scientologist?...... :confused: :)
 
Associate
Joined
18 Oct 2002
Posts
2,367
Is there a giant MAC address DB we can do a look up on that just pops the chaps name and address out ? or would we need to go looking at every network card in the world, cause if we need to do that we need to start soon. They are making new ones almost every day

Indeed, but if you had reason to suspect someone you would have a place to start etc.
 
Associate
Joined
22 May 2003
Posts
492
Location
Derby
Think of Somalians and boats/ ships. Regardless of what people on here might know about the current issues, there is always the possibility for criminals to target you. You're only safe when you're not on the radar..
 

4T5

4T5

Man of Honour
Joined
30 Aug 2004
Posts
27,739
Location
Middle of England
Not hard to buy a wifi lappy for cash & use somebody elses I.P is it. Once you are that far it's just a matter of transfering the funds to the Rusky team & letting them run with it. With the cash you transfer & there competitive nature they would be well on there way to a New challenge.
 
Permabanned
Joined
14 Nov 2002
Posts
5,555
Location
Kent
Indeed, but if you had reason to suspect someone you would have a place to start etc.

Anyone with an ounce of sense would just change it in software. I know I do when I use public networks or whenever I'm away and *ahem* borrowing someone's open wireless. Not that I do anything malicious, of course.
 
Soldato
Joined
6 Nov 2002
Posts
9,818
Location
London UK
Well on the slighty upside of all this, all the press/fuss around this matter on all the other sites/forums etc will do one thing for sure and that's bring people here nosing.

If those people are looking to buy stuff and the prices here are right I very much doubt the majority of the comments being bounced around (real or not) would put them off.
 
Associate
Joined
18 Oct 2002
Posts
2,367
Anyone with an ounce of sense would just change it in software. I know I do when I use public networks or whenever I'm away and *ahem* borrowing someone's open wireless. Not that I do anything malicious, of course.

Yes of course you would, as you are computer savvy. But what about Mr Joe Bloggs who doesnt know his Vistas from his XPs. People dont think that the normal joe bloggs would be accessing others wireless networks but plenty are.
 
Associate
Joined
18 Oct 2002
Posts
2,367
Don't some manufacturers even provide utilities to permanently change the MAC of a NIC? It's completely untraceable.

Yes but its not as if every user would be doing this. Only the professionals which is obviously who the guys doing the DDoS are.
 
Status
Not open for further replies.
Back
Top Bottom