On Fri, Jan 28, 2011 at 04:27:21PM +1030, PryMaL wrote:
They've got soemthing in the region of 300 megabit at their disposal...
not too many single sources (outside data centers) have that kind of
bandwidth.
So my guess still lies at DDoS
Todays update seems to have helped a bit.
Are you
On 28/01/2011 10:48 PM, Harry Strongburg wrote:
Are you implying that it's hard or expensive to get a 300Mbit+ box? Any
skid could easily get that for less than 40 Euro. I doubt someone would
use a botnet for attacking a server with the bug, instead of doing
trivial UDP spoofing on a single
On Fri, Jan 28, 2011 at 11:01:56PM +1030, PryMaL wrote:
anything more than a 100mb connection is difficult to obtain let alone
expensive in Australia.
It's less than 100 euro per month in ... Europe.
However that doesn't mean you can use it for attacks. You can try but
it will be a rather
You will find that it will be ordered through some kiddy host offering
gig ports and then paid for with a bent credit card will use if for a
week till it gets yanked and by which time they are long gone.
Also if they have spoofed the IP then unlieky anyone can submit an abuse
report about it
there are big attacks (gbit?) dos coming from gameservers hosters too...
People exploiting Q3 based games and hoster letting them abuse their
hosted services... (
http://www.lemuria.org/security/application-drdos.html )
Unfortunatly it's not just kids with gbit ports :(
Il 28/01/2011 14:04,
These recent attacks all work by overloading the server with UDP packets.
Most effective are the A2S_INFO and similar attacks using valid packets.
It's very cheap in terms of CPU and bandwidth to craft a packet that asks a
gameserver for it's information. It takes a number of times more CPU power
On 27/01/2011 8:25 PM, Arie wrote:
These recent attacks all work by overloading the server with UDP packets.
Most effective are the A2S_INFO and similar attacks using valid packets.
It's very cheap in terms of CPU and bandwidth to craft a packet that asks a
gameserver for it's information. It
Gameserver port.
The attack appearing to come from hundreds of IPs means nothing as it's
trivial to spoof the source IP with UDP.
On 27 January 2011 11:12, PryMaL pry...@geekout.info wrote:
On 27/01/2011 8:25 PM, Arie wrote:
These recent attacks all work by overloading the server with UDP
On 27/01/2011 8:48 PM, Arie wrote:
The attack appearing to come from hundreds of IPs means nothing as it's
trivial to spoof the source IP with UDP.
They've got soemthing in the region of 300 megabit at their disposal...
not too many single sources (outside data centers) have that kind of
Hello,
Many server admins are reporting to have their servers attacked. There
are several methods used to attack a srcds servers:
-UDP Flood: A packet specially crafted could make pings raise in the
server. Search SRCDS DoS Fix in google, I don't remember the exact names
now, but I
10 matches
Mail list logo