you already did when u told everyone the name of the program in the first email. google is a very powerful tool.
On Mon, Apr 28, 2008 at 6:07 PM, Ian Shaffer <[EMAIL PROTECTED]> wrote: > My big problem here is that I do not have root access to any of my > servers. We used to have all our servers on our own dedi, but BECAUSE of > these attacks, we decided to scrap the dedi and spread our servers > across different IP ranges by paying per slot in different locations. > Even though we can still be attacked, the attack is limited to one > server at a time. That server is usually our Windows 50 man ZombieMod > server in Chicago. I'm currently working with the host to see if the > attack can be detected and blocked automatically. > > I've had a couple people email me asking for this "Nuker" program, or > the link to where to download it. I've notified Alfred of the issue and > sent him the link to the program, however he recommends that I be > careful at how I present my report to the non-moderated HLDS mailing > list. Hence, I will not give this program to ANYBODY unless on Alfred's > approval. > > > Chad Austin wrote: > > Post a dump of packets please, or just link to program so it can be > > analyzed. > > > > Ian Shaffer wrote: > > > >> Dear Network Administrator, > >> > >> Over the past few months my servers have been brought to their knees > >> dozens of times through "nuke" style Denial of Service attacks. Simple > >> put, players start teleporting around, pings gradually start increasing > >> for all players and the timer slows down. After a couple minutes of > >> being attacked, you are early frozen from movement and the timer takes a > >> decade to tick down, and pings are skyrocketed. Players then leave the > >> server. > >> > >> Well earlier this week I "interrogated," pardon the pun, a member of my > >> community who had made an exclamation that it would start to get real > >> laggy in one of our servers earlier in the day. That server, our Zombie > >> Server, started getting nuked just a couple minutes after. I was fairly > >> certain it was him who started the attack. In the evening, I talked to > >> this guy, his alias is "ST. GEORGE," and explained to him that I > >> believed it was him who was "nuking" our servers. I acted very sincere > >> when I told him that I had logged his IP address and was planning on > >> filing a formal abuse complaint to his ISP, Road Runner. He somewhat > >> panicked at hearing this, and confessed as to what he was doing. > >> > >> He sent me a link to download the same hacking tool he said he was > >> using. Hackers Assistant is the program. I scanned the program for any > >> trojans or viruses it might have, it was clean. I ran it and discovered > >> a feature called "Nuker." In there it prompted for a server IP address > >> and port and a box to input a message. One would simply put a server's > >> info in there, type some random stuff in the message box, and click "Nuke." > >> > >> A former member of our community and admitted nuker "ST. GEORGE" tested > >> the software. I was shocked. It was working, The server was being > >> attacked just as described above. I held a sense of accomplishment > >> knowing that I had found the cause of my problems. I therefore began > >> looking for a way to block this programs abilities. Now I needed to know > >> what types of servers this program could attack. ST. GEORGE then showed > >> off nuke attacks on dozens of popular servers in the US and UK, highly > >> popular servers like 24/7 Office Noob Galore and Zombiemod | > >> XFactorGaming, and the program worked to bring down each and every one > >> of them to their knees. There was only one server he was not able to > >> nuke attack, evidently the #1 CSS server in the United States, > >> CantStopGaming CS:S. > >> > >> This program affects practically every single server in CS:S. The > >> interesting part of it is that this program doesn't advise usage towards > >> any particular genre of online infrastructure. ST. GEORGE tried running > >> this program on CoD servers, BF2 and BF2142 servers, Halo PC servers, > >> SA:MP servers, and Quake 4 servers. It didn't work on any of those > >> games. However, it worked on the other popular Source-based game out > >> today, Team Fortress 2. Every TF2 server ST. GEORGE checked was > >> nuke-able, with the same effects felt in-game. This leads me to the > >> conclusion that there must be an exploit in the source engine allowing > >> this program to nuke all servers using the source engine. > >> > >> While our server was getting attacked last time, I gathered critical > >> data. I've determined that the program does not eat up the server's > >> bandwidth. Instead, it seems to flood the server with messages/commands, > >> so much that it tops out CPU usage. Below is a sample of my console as > >> our server was undergoing a recent attack with the program. Midway > >> through the data, the perpetrator aborted the nuke attack. You can see > >> the server recovering as the cpu usage goes down and server FPS comes > >> back to normal. This data was gathered with 8 others in-game. > >> > >> =========================================== > >> > >> CPU In Out Uptime Users FPS Players > >> 96.59 16841.92 3909.91 110 4 10.00 9 > >> L 04/27/2008 - 01:23:04: rcon from "72.251.244.233:2020": command "stats" > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 96.04 17937.41 3958.69 110 4 10.00 9 > >> L 04/27/2008 - 01:23:09: rcon from "72.251.244.233:2020": command "stats" > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 95.54 17590.70 3970.64 110 > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 100.00 17354.72 3966.19 110 4 523.25 9 > >> L 04/27/2008 - 01:23:10: rcon from "72.251.244.233:2020": command "stats" > >> > >> ======== HERE THE ATTACK WAS ABORTED ========= > >> > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 75.57 16933.90 4148.69 110 4 508.36 9 > >> L 04/27/2008 - 01:23:11: rcon from "72.251.244.233:2020": command "stats" > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 75.57 16750.93 4596.00 110 4 509.13 9 > >> L 04/27/2008 - 01:23:12: rcon from "72.251.244.233:2020": command "stats" > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 52.55 16518.30 6391.86 110 4 509.97 9 > >> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command "stats" > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 40.46 16520.83 9229.05 110 4 511.77 9 > >> L 04/27/2008 - 01:23:13: rcon from "72.251.244.233:2020": command "stats" > >> ] rcon stats > >> CPU In Out Uptime Users FPS Players > >> 40.46 16452.49 11473.37 110 4 514.49 9 > >> L 04/27/2008 - 01:23:14: rcon from "72.251.244.233:2020": command "stats" > >> > >> ============================================ > >> > >> > >> I very much hope that this exploit can be stomped out. My community has > >> suffered all too much to the hands of the kiddies that run these types > >> of programs for their own vain pleasure. I speak for server operators > >> everywhere when I say, this issue must be fixed! > >> > >> Thank you very much for taking the time to read my post. I hope some > >> good will come out of it! > >> > >> Sincerely, > >> David "Eaglewonj" Gaipa > >> > >> _______________________________________________ > >> To unsubscribe, edit your list preferences, or view the list archives, > >> please visit: > >> http://list.valvesoftware.com/mailman/listinfo/hlds > >> > >> > >> > > > > > > _______________________________________________ > > To unsubscribe, edit your list preferences, or view the list archives, > > please visit: > > http://list.valvesoftware.com/mailman/listinfo/hlds > > > > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, please > visit: > http://list.valvesoftware.com/mailman/listinfo/hlds > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

