pablonerru
Banned

Saw this, found it slightly amusing
And the situation gets even more interesting as Unknownsec (what seems like a Grey Hat group) goes after Lizard Squad: https://www.facebook.com/unknownsec
Internet war.
http://gotgame.com/wp-content/uploads/2014/05/rrc1594.gif[IMG]
Saw this, found it slightly amusing[/QUOTE]
I don't get it.
Which I would....if...you know.
Guns is what I'm getting from this post.
enlighten us
and the rest of the world
master internet engineer gogogow
Wellwe'rewaiting.gif
Also yes gif. None of this jif nonsense.
Gotta love them anti-DDoS toasters.
Guns is what I'm getting from this post.
DDoS Mitigation
Given the growing number and scale of DDoS attacks, planning for DDoS attack detection and mitigation is a critical IT function. Since it's virtually impossible to build out sufficient infrastructure to scale in response to a large DDoS attack, solutions like Akamai's Kona Site Defender are increasingly being deployed by owners of Web properties across virtually every industry. Cloud-based solutions like Kona Site Defender offer built-in scalability and global reach to defend against most common types of DDoS attacks, as well as attacks against web applications (SQL Injections, Cross Site Scripts, etc.) and direct-to-origin attacks.
How Kona Site Defender Blocks DDoS Attacks
Kona Site Defender mitigates DDoS attacks by absorbing DDoS traffic targeted at the application layer, deflecting all DDoS traffic targeted at the network layer such as SYN Floods or UDP Floods, and authenticating valid traffic at the network edge. This built-in protection is "always on", and only Port 80 (HTTP) or Port 443 (HTTPS) traffic is allowed. Bursting fees can be capped so users are protected from DDoS traffic running up service fees, and flexible caching maximizes offload from origin.
For added protection, many organizations add a defense layer that protects the Domain Name Server from being overloaded and compromised by Denial of Service attacks, such as Akamai's eDNS solution. Both of these solutions leverage the power of the Akamai Intelligent PlatformTM, which consists of more than 100,000 servers deployed across over 1,000 networks in more than 70 countries.
* Specialized On-Premises Equipment. This is similar to “Do It Yourself” in that an enterprise is doing all the work to stop the attack, but instead of relying on scripts or an existing firewall, they purchase and deploy dedicated DDoS mitigation appliances. These are specialized hardware that sit in an enterprise’s data center in front of the normal servers and routers and are specifically built to detect and filter the malicious traffic. However, there are some fundamental problems with these devices:
• They are costly CAPEX purchases that may sit around and do nothing until you get attacked. They also can be expensive to operate. You need skilled network and security engineers to work these devices - there is no magic “mitigate DDoS” button.
• They must be constantly updated by the operations team to keep up to date with the latest threats. DDoS tactics change almost daily. Your team must be prepared to update these devices to the latest threats.
• They can’t handle volumetric attacks. It’s unlikely that an enterprise would have enough bandwidth coming in to handle the very large DDoS attacks occurring today. These hardware appliances don’t do any good when the attack exceeds network capacity.
* Internet Service Provider (ISP). Some enterprises use their ISP to provide DDoS mitigation. These ISP’s have more bandwidth than an enterprise would, which can help with the large volumetric attacks, but there are three key problems with these services as well:
• Lack of core competency: ISP’s are in the business of selling bandwidth and don’t always invest in the required capital and resources to stay ahead of the latest DDoS threats. It can become a cost center to them - something they have to provide, so they do it as cheaply as possible.
Resources
• Single provider protection: Most enterprises today are multi-homed across two or more network providers to remove the single point of failure of a provider. Having two providers is a best practice to maximize uptime. ISP DDoS mitigation solutions only protect their network links, not the other links you might have, so now you need DDoS mitigation services from different providers, doubling your cost.
• No cloud protection: Similar to the above, a lot of Web applications these days are split between enterprise-owned data centers, and cloud services like Amazon AWS, GoGrid, Rackspace, etc. ISP’s can’t protect traffic on these cloud services.
* Cloud Mitigation Provider. Cloud mitigation providers are experts at providing DDoS mitigation from the cloud. This means they have built out massive amounts of network bandwidth and DDoS mitigation capacity at multiple sites around the Internet that can take in any type of network traffic, whether you use multiple ISP’s, your own data center or any number of cloud providers. They can scrub the traffic for you and only send “clean” traffic to your data center.
Cloud mitigation providers have the following benefits:
• Expertise: Generally, these providers have network and security engineers and researchers who are monitoring for the latest DDoS tactics to better protect their customers.
• Lots of bandwidth: These providers have much more bandwidth than an enterprise could provision on its own to stop the biggest volumetric attacks.
• Multiple types of DDoS mitigation hardware: DDoS attacks are extremely complex. There is a need for multiple layers of filtering to be able to keep up with the latest threats. Cloud providers should take advantage of multiple technologies, both commercial off the shelf (COTS) and their own proprietary technology to defend against attacks
Cloud mitigation providers are the logical choice for enterprises for their DDoS protection needs. They are the most cost effective and scalable solution to keep up with the rapid advances in DDoS attacker tools and techniques.
I guess not a lot of people in this thread have seen DeathnoteI made a death note joke a few pages back and no one saw it.
It's just like Watch Dogs
enlighten us
and the rest of the world
master internet engineer gogogow
HAVE A INFINITE AMOUNT OF SERVERS
Yeah. They're 4chan/Anonymous Grey Hats: https://twitter.com/Unkn0wnsec
Don't you guys have google or something?
I guess not a lot of people in this thread have seen Deathnote![]()
Don't you guys have google or something?
What are Grey Hats?
What are Grey Hats?
Let me guess you call the number, they get your phone number and set your ass up for a visit from certain three lettered US agencies?I know what this is. Don't do it.
Don't you guys have google or something?
Nope you would probably need to make it primary.
Don't you guys have google or something?
Don't you guys have google or something?
What are Grey Hats?
I guess not a lot of people in this thread have seen Deathnote![]()
You going to reply to the guy who proved you said sony was hacked, or just going to keep ignoring it and acting like you didnt just google DDoS after being called out on it?
is that kind of like bingFuck. What's a google?
Is there like someone standing behind some posters with a gun to their heads saying POST ABOUT NETWORK SECURITY OR I WILL SHOOT YOU
lol
Black hats are bad guys, white hats are good guys, grey hats fall somewhere in the middle. Not nice (or entirely lawful), precisely, but not destructive.
I don't get it.
Don't you guys have google or something?
I don't get it.
Is there like someone standing behind some posters with a gun to their heads saying POST ABOUT NETWORK SECURITY OR I WILL SHOOT YOU
lol
I like the part in there that says "Since it's virtually impossible to build out sufficient infrastructure to scale in response to a large DDoS attack..."Don't you guys have google or something?
No, seriously, do you understand what a DDOS is?
Do tell.
Eh.....there are ways, appliances etc. to fight and defend against ddos attacks, but whatever.
All according to keikaku?
I doubt him because its so easy to do talk like this. For example, have anyone verified that the IPs he posted earlier are the actual IPs of those lizard guys? Its possible that he is the one doing the DDOS attack, that i can believe, but i have big doubts about anything else of the technical stuff that hes saying.Why doubt him? These people crave attention so if it's not him then he's really on point taking credit for everything with exposing the Lizards and then making his video on YT and everything. If it's not him or he's not involved at all then you'd think the person actually doing it would step up and do the same thing Fame did to the Lizards.
People, me included, have noticed some slow downs and disconnects on XBL but for the post part it's up and running as usual. Are we supposed to be naive enough to think it's just a coincidence and not just a failed attempt at the same thing when the guy said he was going to try? Why would MS be left alone when a bunch of other companies in the industry are getting hit by it?
Lol, that's why you watch the fully animated versionI was going to watch it but then I saw
![]()
and threw up a bit
Haha
Is there a way you can do that on the web? Might solve your issue.
Fuck. What's a google?
I never said Sony was hacked. They were hacked in 2011. And no I didn't google ddos. I did google about ddos protection and defending from them.
Black hats are bad guys, white hats are good guys, grey hats fall somewhere in the middle. Not entirely lawful (or particularly nice) but they generally do good deeds.
Wow, seems Sony didn't learn shit since the 2011 PSN hack. Fucking pathetic. A lot of people saying how these hackers are amateurs, but yet they crippled the entire PSN servers for at least a day, really shows how Sony didn't do squat to upgrade and protect their servers for amateuristic ddos attacks.
What some people? Sony got hacked to hell in 2011 and got personal information from 77 million accounts stolen and yet their servers are still so easy to get crippled. I don't give a shit about the video, what I do know is that I can't sign-in into PSN and play the games I want to play for an entire day. The fact that other sites got easily hacked too doesn't mean it's okay for Sony's to be slacking with their servers. Some people...