Dear Network Administrator,

Over the past few months my servers have been brought to their knees 
dozens of times through "nuke" style Denial of Service attacks. Simple 
put, players start teleporting around, pings gradually start increasing 
for all players and the timer slows down. After a couple minutes of 
being attacked, you are early frozen from movement and the timer takes a 
decade to tick down, and pings are skyrocketed. Players then leave the 
server.

Well earlier this week I "interrogated," pardon the pun, a member of my 
community who had made an exclamation that it would start to get real 
laggy in one of our servers earlier in the day. That server, our Zombie 
Server, started getting nuked just a couple minutes after. I was fairly 
certain it was him who started the attack. In the evening, I talked to 
this guy, his alias is "ST. GEORGE," and explained to him that I 
believed it was him who was "nuking" our servers. I acted very sincere 
when I told him that I had logged his IP address and was planning on 
filing a formal abuse complaint to his ISP, Road Runner. He somewhat 
panicked at hearing this, and confessed as to what he was doing.

He sent me a link to download the same hacking tool he said he was 
using. Hackers Assistant is the program. I scanned the program for any 
trojans or viruses it might have, it was clean. I ran it and discovered 
a feature called "Nuker." In there it prompted for a server IP address 
and port and a box to input a message. One would simply put a server's 
info in there, type some random stuff in the message box, and click "Nuke."

A former member of our community and admitted nuker “ST. GEORGE” tested 
the software. I was shocked. It was working, The server was being 
attacked just as described above. I held a sense of accomplishment 
knowing that I had found the cause of my problems. I therefore began 
looking for a way to block this programs abilities. Now I needed to know 
what types of servers this program could attack. ST. GEORGE then showed 
off nuke attacks on dozens of popular servers in the US and UK, highly 
popular servers like 24/7 Office Noob Galore and Zombiemod | 
XFactorGaming, and the program worked to bring down each and every one 
of them to their knees. There was only one server he was not able to 
nuke attack, evidently the #1 CSS server in the United States, 
CantStopGaming CS:S.

This program affects practically every single server in CS:S. The 
interesting part of it is that this program doesn't advise usage towards 
any particular genre of online infrastructure. ST. GEORGE tried running 
this program on CoD servers, BF2 and BF2142 servers, Halo PC servers, 
SA:MP servers, and Quake 4 servers. It didn't work on any of those 
games. However, it worked on the other popular Source-based game out 
today, Team Fortress 2. Every TF2 server ST. GEORGE checked was 
nuke-able, with the same effects felt in-game. This leads me to the 
conclusion that there must be an exploit in the source engine allowing 
this program to nuke all servers using the source engine.

While our server was getting attacked last time, I gathered critical 
data. I've determined that the program does not eat up the server's 
bandwidth. Instead, it seems to flood the server with messages/commands, 
so much that it tops out CPU usage. Below is a sample of my console as 
our server was undergoing a recent attack with the program. Midway 
through the data, the perpetrator aborted the nuke attack. You can see 
the server recovering as the cpu usage goes down and server FPS comes 
back to normal. This data was gathered with 8 others in-game.

===========================================

CPU In Out Uptime Users FPS Players
96.59 16841.92 3909.91 110 4 10.00 9
L 04/27/2008 - 01:23:04: rcon from "72.251.244.233:2020": command "stats"
] rcon stats
CPU In Out Uptime Users FPS Players
96.04 17937.41 3958.69 110 4 10.00 9
L 04/27/2008 - 01:23:09: rcon from "72.251.244.233:2020": command "stats"
] rcon stats
CPU In Out Uptime Users FPS Players
95.54 17590.70 3970.64 110
] rcon stats
CPU In Out Uptime Users FPS Players
100.00 17354.72 3966.19 110 4 523.25 9
L 04/27/2008 - 01:23:10: rcon from "72.251.244.233:2020": command "stats"

======== HERE THE ATTACK WAS ABORTED =========

] rcon stats
CPU In Out Uptime Users FPS Players
75.57 16933.90 4148.69 110 4 508.36 9
L 04/27/2008 - 01:23:11: rcon from "72.251.244.233:2020": command "stats"
] rcon stats
CPU In Out Uptime Users FPS Players
75.57 16750.93 4596.00 110 4 509.13 9
L 04/27/2008 - 01:23:12: rcon from "72.251.244.233:2020": command "stats"
] rcon stats
CPU In Out Uptime Users FPS Players
52.55 16518.30 6391.86 110 4 509.97 9
L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command "stats"
] rcon stats
CPU In Out Uptime Users FPS Players
40.46 16520.83 9229.05 110 4 511.77 9
L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command "stats"
] rcon stats
CPU In Out Uptime Users FPS Players
40.46 16452.49 11473.37 110 4 514.49 9
L 04/27/2008 - 01:23:14: rcon from "72.251.244.233:2020": command "stats"

============================================


I very much hope that this exploit can be stomped out. My community has 
suffered all too much to the hands of the kiddies that run these types 
of programs for their own vain pleasure. I speak for server operators 
everywhere when I say, this issue must be fixed!

Thank you very much for taking the time to read my post. I hope some 
good will come out of it!

Sincerely,
David “Eaglewonj” Gaipa

_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds

Reply via email to