|
On December 31 2013 12:12 Volband wrote:Show nested quote +On December 31 2013 12:08 LaNague wrote:I'm petty sure if a group can cripple a Riot server so hard, they can gain publicity as well just as easily. The only reason this isnt done often is because those big corporations have the resources to track you down. Tons of people could do it, but 99% of them dont want to go to jail for one day of having 300k people knowing your internet nickname. My question then: how is that possible? Why do you leave the possibility to be hacked by "tons of people", when your best arguement is that you would track them down eventually? Is it perfectly normal to leave such investments and gold mines on such weak pillars?
as far as DDoS goes you can't really do much about it. And you can't enforce a good level of security inside those corporations without getting way too much rules and shit, good ol' trade off between comfort and security. + you always have an idiot that's gonna screw up. The human is always the weak link in real cases of hacking.
|
On December 31 2013 12:14 Gorsameth wrote:Show nested quote +On December 31 2013 12:12 Volband wrote:On December 31 2013 12:08 LaNague wrote:I'm petty sure if a group can cripple a Riot server so hard, they can gain publicity as well just as easily. The only reason this isnt done often is because those big corporations have the resources to track you down. Tons of people could do it, but 99% of them dont want to go to jail for one day of having 300k people knowing your internet nickname. My question then: how is that possible? Why do you leave the possibility to be hacked by "tons of people", when your best arguement is that you would track them down eventually? Is it perfectly normal to leave such investments and gold mines on such weak pillars? Because its almost impossible to stop a DDOS. its like flooding your mailbox with a million letters, If your letterbox is to small to handle it your only other option is to close the lid. Which does the exact same thing. But how can you ddos a whole sever? I heard about ddosing certain people, and that makes sense, but how is there not a defense mechanism if ddosing targets a whole server, or hell, even "just" a game? People hacked CIA, FBI etc, I don't want to believe that there is no way to prevent this.
|
On December 31 2013 12:17 Volband wrote:Show nested quote +On December 31 2013 12:14 Gorsameth wrote:On December 31 2013 12:12 Volband wrote:On December 31 2013 12:08 LaNague wrote:I'm petty sure if a group can cripple a Riot server so hard, they can gain publicity as well just as easily. The only reason this isnt done often is because those big corporations have the resources to track you down. Tons of people could do it, but 99% of them dont want to go to jail for one day of having 300k people knowing your internet nickname. My question then: how is that possible? Why do you leave the possibility to be hacked by "tons of people", when your best arguement is that you would track them down eventually? Is it perfectly normal to leave such investments and gold mines on such weak pillars? Because its almost impossible to stop a DDOS. its like flooding your mailbox with a million letters, If your letterbox is to small to handle it your only other option is to close the lid. Which does the exact same thing. But how can you ddos a whole sever? I heard about ddosing certain people, and that makes sense, but how is there not a defense mechanism if ddosing targets a whole server, or hell, even "just" a game? People hacked CIA, FBI etc, I don't want to believe that there is no way to prevent this.
There is an IP address your game client sends its data to. I send a billion message to that address. It cant handle the amount and it clogs up the buffer causing it to be unreachable. And with that your server is effectively crashed. You can empty the buffer but I just spam it full again ect.
|
On December 31 2013 12:17 Volband wrote:Show nested quote +On December 31 2013 12:14 Gorsameth wrote:On December 31 2013 12:12 Volband wrote:On December 31 2013 12:08 LaNague wrote:I'm petty sure if a group can cripple a Riot server so hard, they can gain publicity as well just as easily. The only reason this isnt done often is because those big corporations have the resources to track you down. Tons of people could do it, but 99% of them dont want to go to jail for one day of having 300k people knowing your internet nickname. My question then: how is that possible? Why do you leave the possibility to be hacked by "tons of people", when your best arguement is that you would track them down eventually? Is it perfectly normal to leave such investments and gold mines on such weak pillars? Because its almost impossible to stop a DDOS. its like flooding your mailbox with a million letters, If your letterbox is to small to handle it your only other option is to close the lid. Which does the exact same thing. But how can you ddos a whole sever? I heard about ddosing certain people, and that makes sense, but how is there not a defense mechanism if ddosing targets a whole server, or hell, even "just" a game? People hacked CIA, FBI etc, I don't want to believe that there is no way to prevent this.
There is no way without putting serious restrictions, and even then one of your employee's gonna screw up. Just look at stuxnet, they managed to infiltrate the "intranet" of a secret iranian nuclear power plant (and it was because a nuclear scientist screwed up, using the same comp in the central and during a russian trip). only the thing where literraly a handful of people have access to it (nuclear weapons ie) are near 100% safety.
|
They ddos entire servers using botnets. Essentially, people can write virus/programs that can latch onto random computers and stay undetected. What they do is hijack a portion of your computer's memory to conduct whatever activity the hacker wants it to do, whether it's mining bitcoins or ddos. These programs use minimal amounts of memory in order to remain undetected. Infect enough computers, which is honestly not the hardest thing to do, and you get yourself a network of computers with enough processing power to do w/e you want it to do.
In this case, the hacker basically just uses a botnet to ddos the server. Imagine EUW peak times - that's essentially what the hacker is trying to do to the servers. It's hard to prevent because all a ddos really is is a constant stream of requests to the server. How do you differentiate between legit requests from users from a ddos when it effectively looks the same?
People hacking the CIA, FBI and such is much different and much more sophisticated. There was a really good article in TIMES a few months ago that detailed cyber attacks on American companies by Chinese hacker groups. This situation is more like a game of whack-a-mole. Company A creates a security mechanism. Hacker group X finds a way around it (nothing is perfect). Company A now has to update their mechanism to fix the exploited vulnerability. Hacker group Y finds a way around that, etc...
|
On December 31 2013 12:25 Ryuu314 wrote: They ddos entire servers using botnets. Essentially, people can write virus/programs that can latch onto random computers and stay undetected. What they do is hijack a portion of your computer's memory to conduct whatever activity the hacker wants it to do, whether it's mining bitcoins or ddos. These programs use minimal amounts of memory in order to remain undetected. Infect enough computers, which is honestly not the hardest thing to do, and you get yourself a network of computers with enough processing power to do w/e you want it to do.
In this case, the hacker basically just uses a botnet to ddos the server. Imagine EUW peak times - that's essentially what the hacker is trying to do to the servers. It's hard to prevent because all a ddos really is is a constant stream of requests to the server. How do you differentiate between legit requests from users from a ddos when it effectively looks the same?
People hacking the CIA, FBI and such is much different and much more sophisticated. There was a really good article in TIMES a few months ago that detailed cyber attacks on American companies by Chinese hacker groups.
do you know if there is a free version of this article somewhere ?
|
On December 31 2013 12:26 sAsImre wrote:Show nested quote +On December 31 2013 12:25 Ryuu314 wrote: They ddos entire servers using botnets. Essentially, people can write virus/programs that can latch onto random computers and stay undetected. What they do is hijack a portion of your computer's memory to conduct whatever activity the hacker wants it to do, whether it's mining bitcoins or ddos. These programs use minimal amounts of memory in order to remain undetected. Infect enough computers, which is honestly not the hardest thing to do, and you get yourself a network of computers with enough processing power to do w/e you want it to do.
In this case, the hacker basically just uses a botnet to ddos the server. Imagine EUW peak times - that's essentially what the hacker is trying to do to the servers. It's hard to prevent because all a ddos really is is a constant stream of requests to the server. How do you differentiate between legit requests from users from a ddos when it effectively looks the same?
People hacking the CIA, FBI and such is much different and much more sophisticated. There was a really good article in TIMES a few months ago that detailed cyber attacks on American companies by Chinese hacker groups. do you know if there is a free version of this article somewhere  ? lemme look it up. I have the magazine. Dunno if there's a free version of it online tho.
|
On December 31 2013 11:55 Volband wrote: *snip* 1) Don't actually care all that much about PL, just that he's an idiot that shouldn't be benefiting from this, and outlining that he is clearly culpable. In a court of law, "what many of us would've done" isn't a passable defense for this situation.
2) If you replaced "hacker/ddoser" with "serial killer", would his actions have been acceptable or prudent? Extreme example, yes, but you get the idea. It's probably not a good idea to interact with people who are doing clearly illegal things and are drawing ire (on a public stream no less).
3) PL will, realistically, get sent threatening letters and maybe agree to pay some small compensation to volvo, yes. However, there is always the chance that they'll go apeshit and push it (which they easily can), and you shouldn't be boneheaded enough to raise that possibility.
I honestly don't want to talk about him anymore now that LoL's back up. I never liked his stream anyways. :x
|
On December 31 2013 12:27 Ryuu314 wrote:Show nested quote +On December 31 2013 12:26 sAsImre wrote:On December 31 2013 12:25 Ryuu314 wrote: They ddos entire servers using botnets. Essentially, people can write virus/programs that can latch onto random computers and stay undetected. What they do is hijack a portion of your computer's memory to conduct whatever activity the hacker wants it to do, whether it's mining bitcoins or ddos. These programs use minimal amounts of memory in order to remain undetected. Infect enough computers, which is honestly not the hardest thing to do, and you get yourself a network of computers with enough processing power to do w/e you want it to do.
In this case, the hacker basically just uses a botnet to ddos the server. Imagine EUW peak times - that's essentially what the hacker is trying to do to the servers. It's hard to prevent because all a ddos really is is a constant stream of requests to the server. How do you differentiate between legit requests from users from a ddos when it effectively looks the same?
People hacking the CIA, FBI and such is much different and much more sophisticated. There was a really good article in TIMES a few months ago that detailed cyber attacks on American companies by Chinese hacker groups. do you know if there is a free version of this article somewhere  ? lemme look it up. I have the magazine. Dunno if there's a free version of it online tho.
just gimme the reference i can get it via my uni anyway.
|
The ddosing is just abusing the way the internet is allowing almost everything to connect to everything.
There is no screw up.
The way this is prevented is to find better and better ways to track down whoever is controlling the attack. Im pretty sure they allready are cooperating with the local police to get camera feeds from whatever public place those guys thought they were save from.
Since tracking them down and ruining their lives is the best way to prevent further attacks, the companies will be pretty relentless.
|
Why are we calling script kiddies hackers?
|
On December 31 2013 12:31 LaNague wrote: The ddosing is just abusing the way the internet is allowing almost everything to connect to everything.
There is no screw up.
The way this is prevented is to find better and better ways to track down whoever is controlling the attack. Im pretty sure they allready are cooperating with the local police to get camera feeds from whatever public place those guys thought they were save from.
Since tracking them down and ruining their lives is the best way to prevent further attacks, the companies will be pretty relentless.
for ddosing the screw up part is the protection of 99.9% of the computers with internet access.
|
On December 31 2013 12:28 sAsImre wrote:Show nested quote +On December 31 2013 12:27 Ryuu314 wrote:On December 31 2013 12:26 sAsImre wrote:On December 31 2013 12:25 Ryuu314 wrote: They ddos entire servers using botnets. Essentially, people can write virus/programs that can latch onto random computers and stay undetected. What they do is hijack a portion of your computer's memory to conduct whatever activity the hacker wants it to do, whether it's mining bitcoins or ddos. These programs use minimal amounts of memory in order to remain undetected. Infect enough computers, which is honestly not the hardest thing to do, and you get yourself a network of computers with enough processing power to do w/e you want it to do.
In this case, the hacker basically just uses a botnet to ddos the server. Imagine EUW peak times - that's essentially what the hacker is trying to do to the servers. It's hard to prevent because all a ddos really is is a constant stream of requests to the server. How do you differentiate between legit requests from users from a ddos when it effectively looks the same?
People hacking the CIA, FBI and such is much different and much more sophisticated. There was a really good article in TIMES a few months ago that detailed cyber attacks on American companies by Chinese hacker groups. do you know if there is a free version of this article somewhere  ? lemme look it up. I have the magazine. Dunno if there's a free version of it online tho. just gimme the reference i can get it via my uni anyway. http://content.time.com/time/magazine/article/0,9171,2136810,00.html
There was also another article by Bloomberg called "A portrait of a Chinese hacker." or something along those lines.
|
Anyone else have their friendlist deleted?
o.o
Wut. Riot pls.
|
it just the chat being bugged i think and Oddone is playing Yi jungle in normals lol.
|
On December 31 2013 12:33 Ryuu314 wrote:Show nested quote +On December 31 2013 12:28 sAsImre wrote:On December 31 2013 12:27 Ryuu314 wrote:On December 31 2013 12:26 sAsImre wrote:On December 31 2013 12:25 Ryuu314 wrote: They ddos entire servers using botnets. Essentially, people can write virus/programs that can latch onto random computers and stay undetected. What they do is hijack a portion of your computer's memory to conduct whatever activity the hacker wants it to do, whether it's mining bitcoins or ddos. These programs use minimal amounts of memory in order to remain undetected. Infect enough computers, which is honestly not the hardest thing to do, and you get yourself a network of computers with enough processing power to do w/e you want it to do.
In this case, the hacker basically just uses a botnet to ddos the server. Imagine EUW peak times - that's essentially what the hacker is trying to do to the servers. It's hard to prevent because all a ddos really is is a constant stream of requests to the server. How do you differentiate between legit requests from users from a ddos when it effectively looks the same?
People hacking the CIA, FBI and such is much different and much more sophisticated. There was a really good article in TIMES a few months ago that detailed cyber attacks on American companies by Chinese hacker groups. do you know if there is a free version of this article somewhere  ? lemme look it up. I have the magazine. Dunno if there's a free version of it online tho. just gimme the reference i can get it via my uni anyway. http://content.time.com/time/magazine/article/0,9171,2136810,00.htmlThere was also another article by Bloomberg called "A portrait of a Chinese hacker." or something along those lines.
thanks a lot
|
On December 31 2013 12:32 wei2coolman wrote: Why are we calling script kiddies hackers? Why are some people acting like hacker is a compliment?
|
So I haven't been online too much today and I don't feel like reading through 7-ish pages of the thread, can someone gimme a tl;dr version of what happened to LoL today?
|
league and other games got DDOS'd, PL streamed interactions with the party that claimed the attacks, cops showed on his door
|
They couldn't come up with a better name than DERP? I feel like thats a term only popular with 13yr olds...
|
|
|
|