Denial of Service Attack

A denial of service attack is when the attacker uses a large number of computers to simultaneously access a service on the attacked computer. That makes it impossible for the attacked computer to provide its normal service.
 
I've heard the term, but I have not a clue what it IS.

Denial of Service attack. It's like if I set up a robo-dialler to call your phone thousands of times a day, so genuine calls couldn't get through.

A common version DDoS is "distributed DoS": as if I tricked thousands of people into phoning you constantly, do you couldn't defeat it just by blocking one caller.
 
Thank you.
I'm sure that the logic of such effort will eventually filter into my head. . . .
 
Thank you.
I'm sure that the logic of such effort will eventually filter into my head. . . .

Truthfully, it depends...

Not as often anymore granted, but in the olden days of yore, a DoS could occur naturally with no malice behind it. Effectively, all the operators were busy and no one was available to take your call.

For the most part, this just doesn't happen as much any more as network administrators design to prevent such. Although, you will still occasionally see it when something new goes live that didn't take into account such widespread public interest or in the event that a cascade failure takes a portion of the server bank out of commission.

But, no. What is usually being referred to is a willful Denial of Service of service attack.

More often than not, these are on the level of particularly juvenile pranks. They don't typically last long and there is generally not much damage done on the whole. Sort of a digital version of "ring and run" where the h@ck3r in question then gets to gloat about it and collect kudos from others of a like mind.

But, there are more serious versions of it as well. These can generally be identified by a) duration and b) what ELSE happens at the same time.

Since I used to teach the people who were supposed to deal with this crap when it happened, and I've probably already overstretched any welcome for the explanation, I'll just say this;

If you can imagine a point where not having access to information in a timely fashion would be a problem, so can the black hats. And many more points besides.
 
Thank you.
I'm sure that the logic of such effort will eventually filter into my head. . . .

Imagine you're in a room with one person. The two of you can have a nice conversation.

Imagine you're in a room with 1,000 other people all trying to talk to you at the same time. No nice conversation.

Essentially, China, or whomever, is trying to overload someone else's computer systems such that they can't communicate with anyone else.
 
If you click on the link you will be able to watch the attack, which is still going on, in real time.

Thousands and thousand of request from some computer in Roseville, CA.
 
If you click on the link you will be able to watch the attack, which is still going on, in real time.

Thousands and thousand of request from some computer in Roseville, CA.

This is an area I have a great deal of knowledge about.

The U.S. Cyber Command is without a doubt or debate the most powerful and advanced Cyber Specific Military Computer and System Attack and Defense Group on planet Earth.

This is what is going on......

China in an attempt to gain more influence in the Pacific Rim waters has been BUILDING ISLANDS by reclaiming sand from the shallow ocean bottom in that region and piling it upon coral reefs and sunken atolls and then China has been trying to say this land and 12 Knots around it is China's Territory and Territorial Waters.

Just a few days back the United States Air Force flew a B-52 directly over this man made Chinese Island.

China is response is attempting a Cyber Attack that CHINA THINKS U.S CYBER COMMAND CANNOT DIRECTLY PROVE IS COMING FROM CHINA!!!

U.S. Cyber Command is PURPOSELY ALLOWING THE CYBER ATTACK.....as by doing this Cyber Command can.....TAG....any incoming Hack attempts.

By TAGGING....any further use of the same software or group will be immediately identifiable by U.S. Cyber Command.

Just like any U.S. Military Service Branch....U.S. Cyber Command fights with other service branches and agencies for FUNDS!!!

So...what is the easiest way to easily procure large funding???

MY MAKING IT SEEM AS IF THE NATIONAL SECURITY OF THE UNITED STATES IS VULNERABLE TO A THREAT!!!

This threat being a Cyber Attack from China.

Let me assure members here....and I really KNOW what I am talking about.....If we wanted to.....U.S. Cyber Command could CRUSH IMMEDIATELY any attempted Cyber Attack upon any level involving hundreds if not thousands of systems all attacking us at the same time!!!

But to do that would not allow Cyber Command to....TAG....those attempting the Cyber Attack.


U.S. Cyber Command could in reality TURN OFF THE POWER SUPPLIES OF ANY NATION ON EARTH!!!

U.S. Cyber Command has already demonstrated the Worlds First Cyber Attack that resulted in PHYSICAL DESTRUCTION when U.S. Cyber Command and the NSA were able to infect all Iranian Nuclear Facility Mainframes where Iran's Nuclear Enrichment Centrifuges were running as we were able to make it seem that the Centrifuges spin rate....which must be exact to enrich Uranium to weapons grade Uranium as this is a very old way to enrich Uranium to Weapons Grade......we made it seem to the Iranian's that the centrifuge spin rate was correct not only on the mainframes but even on individual centrifuges when diagnostics were done.

There is a specific part made by a German Company....and I will not go into this further....that we were able to effect which resulted in the centrifuges is many cases EXPLODING.

Point is....American's have NOTHING TO WORRY ABOUT!!

Predominant
 
There is a specific part made by a German Company....and I will not go into this further....that we were able to effect which resulted in the centrifuges is many cases EXPLODING.

Siemens. That is a published story. No need to be hush-hush.
 
This is an area I have a great deal of knowledge about.

The U.S. Cyber Command is without a doubt or debate the most powerful and advanced Cyber Specific Military Computer and System Attack and Defense Group on planet Earth.

This is what is going on......

China in an attempt to gain more influence in the Pacific Rim waters has been BUILDING ISLANDS by reclaiming sand from the shallow ocean bottom in that region and piling it upon coral reefs and sunken atolls and then China has been trying to say this land and 12 Knots around it is China's Territory and Territorial Waters.

Just a few days back the United States Air Force flew a B-52 directly over this man made Chinese Island.

China is response is attempting a Cyber Attack that CHINA THINKS U.S CYBER COMMAND CANNOT DIRECTLY PROVE IS COMING FROM CHINA!!!

U.S. Cyber Command is PURPOSELY ALLOWING THE CYBER ATTACK.....as by doing this Cyber Command can.....TAG....any incoming Hack attempts.

By TAGGING....any further use of the same software or group will be immediately identifiable by U.S. Cyber Command.

Just like any U.S. Military Service Branch....U.S. Cyber Command fights with other service branches and agencies for FUNDS!!!

So...what is the easiest way to easily procure large funding???

MY MAKING IT SEEM AS IF THE NATIONAL SECURITY OF THE UNITED STATES IS VULNERABLE TO A THREAT!!!

This threat being a Cyber Attack from China.

Let me assure members here....and I really KNOW what I am talking about.....If we wanted to.....U.S. Cyber Command could CRUSH IMMEDIATELY any attempted Cyber Attack upon any level involving hundreds if not thousands of systems all attacking us at the same time!!!

But to do that would not allow Cyber Command to....TAG....those attempting the Cyber Attack.


U.S. Cyber Command could in reality TURN OFF THE POWER SUPPLIES OF ANY NATION ON EARTH!!!

U.S. Cyber Command has already demonstrated the Worlds First Cyber Attack that resulted in PHYSICAL DESTRUCTION when U.S. Cyber Command and the NSA were able to infect all Iranian Nuclear Facility Mainframes where Iran's Nuclear Enrichment Centrifuges were running as we were able to make it seem that the Centrifuges spin rate....which must be exact to enrich Uranium to weapons grade Uranium as this is a very old way to enrich Uranium to Weapons Grade......we made it seem to the Iranian's that the centrifuge spin rate was correct not only on the mainframes but even on individual centrifuges when diagnostics were done.

There is a specific part made by a German Company....and I will not go into this further....that we were able to effect which resulted in the centrifuges is many cases EXPLODING.

Point is....American's have NOTHING TO WORRY ABOUT!!

Predominant

Right...

So China is building islands in central China where they have all the land they can handle already?!?!?!?

Attack from...

Chinanet Guangdong Province Network - IP 59.34.197.163

Whois places the IP in central China.

http://59.34.197.163.ipaddress.com/
 
U.S. Cyber Command could in reality TURN OFF THE POWER SUPPLIES OF ANY NATION ON EARTH!!!

If you knew that for a fact, you wouldn't be allowed to say it.

U.S. Cyber Command has already demonstrated the Worlds First Cyber Attack that resulted in PHYSICAL DESTRUCTION

Stuxnet was an American/Israeli venture, though neither partner has admitted it publically. It was intricate, complex, well executed, and very real. But that's a far cry from your other claim.
 
This is an area I have a great deal of knowledge about... The U.S. Cyber Command is without a doubt or debate the most powerful and advanced Cyber Specific Military Computer and System Attack and Defense Group on planet Earth.

Taking your work on that...

Are you telling us that the most powerful and advanced etc. etc. on Earth isn't capable of finding a post about them that's on a public forum, full of obvious keywords?

Or are you telling us that they're A-OK with you posting their Secret Strategy to a public forum?

Or are you telling us that the most advanced cyber-warfare group on the planet isn't capable of stopping you posting it to a public forum?

U.S. Cyber Command has already demonstrated the Worlds First Cyber Attack that resulted in PHYSICAL DESTRUCTION when U.S. Cyber Command and the NSA were able to infect all Iranian Nuclear Facility Mainframes

Not quite. There were several other damaging cyber attacks before Stuxnet, going as far back as 1982, e.g.:

http://www.risidata.com/Database/Detail/cia-trojan-causes-siberian-gas-pipeline-explosion
http://www.risidata.com/Database/Detail/baku-tbilisi-ceyhan-pipeline-explosion

Right...

So China is building islands in central China where they have all the land they can handle already?!?!?!?

No, the islands are in the South China Sea. Here's an article about it: http://www.abc.net.au/news/2015-09-22/south-china-sea-islands-before-and-after/6794076
 
Right...

So China is building islands in central China where they have all the land they can handle already?!?!?!?

Attack from...

Chinanet Guangdong Province Network - IP 59.34.197.163

Whois places the IP in central China.

http://59.34.197.163.ipaddress.com/

China is building islands to extend their ocean territorial claims.

We just sent a B-52 to fly over it.

It's last weeks news.

Predominant
 
Yes, I got that. Yet the attack came from the middle of the country and his rantings were irrelevant.

I think Predominant's theory there was that the DoS attack is Chinese saber-rattling in response to US overflights in the South China Sea. That bit is plausible enough; both sides are looking for ways to throw their weight around as far as they can without quite escalating to a shooting war. And I'm not clear why you think the attack coming from the middle of the country makes a difference; it's all the same government.

But beyond that, I'm sceptical that anybody who genuinely had inside knowledge about this would be posting it to Literotica. And there are other possible explanations for the attack, e.g. might be harassment against a dissident website hosted on a US server.
 
If you knew that for a fact, you wouldn't be allowed to say it.



Stuxnet was an American/Israeli venture, though neither partner has admitted it publically. It was intricate, complex, well executed, and very real. But that's a far cry from your other claim.

Jane's Defense has already reported on U.S. Cyber Command capability of shutting down power to many world cities.

Predominant
 
Insider knowledge, yeah, I'm convinced. I think I'll put on my aluminium hat, that way I'll be safe.

I bet this guy can tell us all about Kim Jong Un and his 'H' bomb as well.

Can you guys keep whatever is in the water, north of the equator? Ta.



But beyond that, I'm sceptical that anybody who genuinely had inside knowledge about this would be posting it to Literotica. And there are other possible explanations for the attack, e.g. might be harassment against a dissident website hosted on a US server.
 
Insider knowledge, yeah, I'm convinced. I think I'll put on my aluminium hat, that way I'll be safe.

I bet this guy can tell us all about Kim Jong Un and his 'H' bomb as well.

Can you guys keep whatever is in the water, north of the equator? Ta.

Or we could just send Tony over to shirt-front everybody involved. That'll sort 'em out.
 
Attacks still happening...

Now Canada has joined in. :eek:
 
Last edited:
Back
Top