Jump to content

About ddos


Recommended Posts

So this ddoser threatened the admins asking for a player to get unbanned, saying he'd ddos the server if they didnt unban. The admins told him to go fuck himself or sumthing and now both servers are down for hours everyday. 

so now I cant do runs despite the fact in FUCKING BROKE. after the admins rigged the casino, changing the rules of blackjack. next time i double down a 5m bet on blackjack when I get an 11 DRAW A FUCKING KING AND THEN THE DEALER 8 8 4 Ace WTF IS THAT SHIT.  (in real blackjack the dealer will stand on 20 and my blackjack wins 10m)

The admins prob wanted to create another huge money sink for the top 5% of players but all they did was wipeout a fuck ton of players with under 10m and who knows how many of those players alt + f4ed and will never come back

Im fucking :Babyrage:

TBH the admins are prob working really hard to solve the ddosing but keep blundering shit like this and they will loose players  😕

Link to comment

What method is the DDOSer using?  Is he botnetting or stress testing?  

If he's stress testing, you just contact the owner of the ip and demand to have all your ips blacklisted or you'll file legal action.  They usually have contact information listed.
If he's botnetting, he'll run out of machines eventually, and he's costing himself more time building up a botnet like than all the players he's inconveniencing combined. 

Link to comment
  • SWAT Commander
On 8/14/2020 at 1:30 PM, anti said:

What method is the DDOSer using?  Is he botnetting or stress testing?  

If he's stress testing, you just contact the owner of the ip and demand to have all your ips blacklisted or you'll file legal action.  They usually have contact information listed.
If he's botnetting, he'll run out of machines eventually, and he's costing himself more time building up a botnet like than all the players he's inconveniencing combined. 

A stresser is usually just a web api to control a botnet, so regardless of if he is using a web stresser, or a normal type botnet, it's basically the same thing. The only way to get the IP of the cnc servers for the web stressers would be to confiscate an infected machine and try to find the traffic from the cnc server (Cnc = control and command, main botnet server basically). 

You don't really run out of bots, it's a keep-alive type connection, meaning it stays alive. You can lose bots depending on what you're scanning for, if people are using default ssh logins, all it takes is a password change / reboot and you'll be good. If they are using an exploit, the only way to really kill those bots is if the device manufacturer releases a patch for that exploit and they update their machine. So, he's really not costing himself much building it.

TLDR; It's not hard what he's doing, he clearly has a lot of time to waste on his hands and this DDoSing cannot easily be stopped. As far as mitigation and DDoS protection go, botnets can be strong, which will make mitigation useless to a certain extent, and there are various methods to bypass certain DDoS protection, such as OVH, CF, etc... So, there's no easy way of getting around this.

Edited by Xlax
Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use and our Privacy Policy.