Message from @Crafty

Discord ID: 643867640225333259


2019-11-12 17:34:32 UTC  

We have our own mini trump actively hiding potential corruption

2019-11-12 17:34:36 UTC  

And no one cares

2019-11-12 17:34:39 UTC  

Amplified DDOS attacks @Crafty

2019-11-12 17:35:03 UTC  

They have many server farms around the world, which they use to load balance, meaning you need to hit them all for the website to go down

2019-11-12 17:35:20 UTC  

Since that amount of data is hard to generate even with a botnet, amplification is required

2019-11-12 17:35:47 UTC  

> This DDoS attack is a reflection-based volumetric distributed denial-of-service (DDoS) attack in which an attacker leverages the functionality of open DNS resolvers in order to overwhelm a target server or network with an amplified amount of traffic, rendering the server and its surrounding infrastructure inaccessible.

2019-11-12 17:36:07 UTC  

You spoof the requester IP address of a DNS request you send to a server, which might only be a couple Kb in size, then the server is able to send say Mb to the spoofed address

2019-11-12 17:36:16 UTC  

Meaning, you can use that botnet to contact other servers to DDOS for you

2019-11-12 17:36:26 UTC  

As they're able to output much more data than you ever could

2019-11-12 17:36:32 UTC  

I can't remember which protocol they abuse

2019-11-12 17:36:36 UTC  

I think it's DNS, not sure though

2019-11-12 17:36:59 UTC  

Ah yeah! I was right

2019-11-12 17:37:55 UTC  

yeah cloudflare have a page on it

2019-11-12 17:38:11 UTC  

Does it show their mitigation?

2019-11-12 17:38:18 UTC  

Yes

2019-11-12 17:38:46 UTC  

``How does Cloudflare mitigate DNS amplification attacks?

With a properly configured firewall and sufficient network capacity (which isn't always easy to come by unless you are the size of Cloudflare), it's trivial to block reflection attacks such as DNS amplification attacks. Although the attack will target a single IP address, our Anycast network will scatter all attack traffic to the point where it is no longer disruptive. Cloudflare is able to use our advantage of scale to distribute the weight of the attack across many Data Centers, balancing the load so that service is never interrupted and the attack never overwhelms the targeted server’s infrastructure. During a recent six month window our DDoS mitigation system "Gatebot" detected 6,329 simple reflection attacks (that's one every 40 minutes), and the network successfully mitigated all of them. Learn more about Cloudflare's advanced DDoS Protection.``

2019-11-12 17:38:58 UTC  

Yeah, they just depend on sheer network capacity and load balancing

2019-11-12 17:39:27 UTC  

> With 30 Tbps of capacity, it can handle any modern distributed attack, including those targeting DNS infrastructure.
😍

2019-11-12 17:40:01 UTC  

they must charge a pretty penny for their service

2019-11-12 17:40:07 UTC  

to make it financially viable

2019-11-12 17:40:14 UTC  

right?

2019-11-12 17:40:18 UTC  

For comparision, the cables running from the UK to the USA have around 30-50 Tbps of capacity each.

2019-11-12 17:40:35 UTC  

I'd imagine so yeah @Crafty

2019-11-12 17:41:51 UTC  

OH

2019-11-12 17:41:57 UTC  

No, it comes as standard

2019-11-12 17:41:58 UTC  

they have data centers in china for their enterprise package

2019-11-12 17:42:07 UTC  

> All Cloudflare plans offer unlimited and unmetered mitigation of distributed denial-of-service (DDoS) attacks, regardless of the size of the attack, at no extra cost.

2019-11-12 17:42:09 UTC  

Fucking powerful.

2019-11-12 17:42:13 UTC  

How long before the Russians get the blame

2019-11-12 17:42:32 UTC  

Scroll down and look at some of the historical attacks

2019-11-12 17:42:53 UTC  

they were immediately, dubdog

2019-11-12 17:43:00 UTC  

not officially

2019-11-12 17:43:20 UTC  

I wouldn't be surprised if this was actually business sponsored kek

2019-11-12 17:43:33 UTC  

Some big businesses throwing some cash to a group, getting them to attack Labour

2019-11-12 17:43:40 UTC  

fact is anyone can buy botnet time, but yeah

2019-11-12 17:43:45 UTC  

how would you prove it was a large entity

2019-11-12 17:43:54 UTC  

or a state

2019-11-12 17:44:10 UTC  

pretty hard if you covered your tracks well

2019-11-12 17:44:30 UTC  

Funnily enough this is what I'm studying