OcUK DDoS attack - £10,000 reward

Status
Not open for further replies.
Has anyone mentioned No Competitors!? The alternative to overclockers but they suck in comparison! They probably realised they were loosing too much business and started corporate warfare! I say retaliate and send in the troops!
 
Has anyone mentioned ****? The alternative to overclockers but they suck in comparison! They probably realised they were loosing too much business and started corporate warfare! I say retaliate and send in the troops!

OH now you have gone and done it, The overclockers.co.uk ballance has been tippled over and everyone needs to hide :eek:
 
That explains why I could never finish registering on the forum....I've been trying for the past week!

Finally!


The DDoS attacks was probably doing me a favour, keeping me from spending all my money here! I dread to think how much I have over the past few years!
 
I'm a security bod... the only security bod... for an organisation with ~40k users. The latest DDoS method is the DNS "." query attack, which for very little output produces large returns, i.e. the complete root nameserver list. Only works via unpatched BIND servers, of which unfortunately there are many. Was it this? If so, you've little chance of catching the culprits I'm afraid. :(
 
I'm a security bod... the only security bod... for an organisation with ~40k users. The latest DDoS method is the DNS "." query attack, which for very little output produces large returns, i.e. the complete root nameserver list. Only works via unpatched BIND servers, of which unfortunately there are many. Was it this? If so, you've little chance of catching the culprits I'm afraid. :(

Wut.
 
I'm a security bod... the only security bod... for an organisation with ~40k users. The latest DDoS method is the DNS "." query attack, which for very little output produces large returns, i.e. the complete root nameserver list. Only works via unpatched BIND servers, of which unfortunately there are many. Was it this? If so, you've little chance of catching the culprits I'm afraid. :(

He did it, and is trying to cover his tracks. The filthy rotter!!:mad:

Paypal ok?
 
I'm a security bod... the only security bod... for an organisation with ~40k users. The latest DDoS method is the DNS "." query attack, which for very little output produces large returns, i.e. the complete root nameserver list. Only works via unpatched BIND servers, of which unfortunately there are many. Was it this? If so, you've little chance of catching the culprits I'm afraid. :(

Yes. OcUK will be running an unpatched bind server on their web server.
 
Status
Not open for further replies.
Back
Top Bottom