Phydeaux
Posts: 4828
Joined: 1/4/2004 Status: offline
|
quote:
ORIGINAL: DomKen quote:
ORIGINAL: Phydeaux quote:
ORIGINAL: DomKen quote:
ORIGINAL: Phydeaux Uh-huh. However the website for healthcare.gov is, in fact, responding to pings. It also has a number of other security breaches. Besides you are factually wrong. Pings can indeed cause a denial of service even if your firewall is set to dump icmp. The question isn't the bandwidth behind the firewall - its the bandwith leading to the firewall or of the firewall. Or don't you know what a step back period is? Also it is not a fact that people caught executing DDOS attacks uniformly get lengthy sentences. Have you never been to defcon, greyhat or black hat? Did you try hitting it with a few hundreds pings in a second? And what other security breaches? Or is that more of your fantasies? A firewall that rejects ICMP is receiving those packets and just sees the header and dumps it. No response and no further processing. It would take a huge volume of pings, hundreds of thousands to millions per second, to affect a server setup to handle a significant load. That's why DDoS attacks that succeed do full web requests. Hacker conventions are not places where you will find actual black hat hackers. That's just script kiddies and wannabes. Here's a story about real hackers who got caught in the last couple of years. http://www.businessweek.com/articles/2013-02-07/suicide-of-hacker-shows-we-need-new-online-laws Once again, you were caught wrong. (saying the web site would have ping disabled). Now you're trying to cover. As usual a lie. Here is what I wrote quote:
Ping cannot cause a DoS since most firewalls are now set to not echo ICMP packets or to stop responding if it starts getting lots of them. Now where in that does it say that the healthcare.giov sites firewall is set to reject pings? When will you tire of making shit up? quote:
And trust me. Something as simple as pings have been used many, many times in DDOS attacks. Yeah back in 2001 or so. quote:
As for hacker conventions not being places to find black hackers - you know nothing. Since I was involved in the founding of one of those conventions - and I know who the guests lists were. Sure you were. You don't know shit about computers. You were wrong on RAID, you were wrong on pings and you sure as hell are wrong that any black hats would ever appear in public. by definition black hat hackers are the guys who steal and do damage. The good ones are very wanted by every law enforcement organization in the world. quote:
Son, I'm not going to do your homework, or teach you 30 years of It experience in a post. If you're curious about the security breaches of healthcare.gov., go do your own homework. So another lie. Do you not ever tire of making shit up? Lets consider what you actually said: quote:
Ping cannot cause a DoS since most firewalls are now set to not echo ICMP packets or to stop responding if it starts getting lots of them. You then acknoweldge that ping can in fact be used in ddos (I suppose you googled after the original post). In point of fact ping has been used *millions* of times to make denial of service attacks. Let me help your education. Google ping of death. So - you are flat out wrong (again) that ping cannot be used in ddos. And you say "considering that most firewalls are set up not to echo icmp or stop responding". So the first part of that is correct. Most firewalls are set up to not echo ICMP. That however, does not stop a ddos. It just makes it go from pathetically easy to only slightly less hard to execute. So then I showed you that the healthcare site was NOT setup for best practise, because one of the most rudimentary of security procedures isn't followed. Its also susceptible to malformed icmp and poison pill. Go google what those are. As for "most firewalls are set up to stop responding if they get too many". Absolute poppy cock. Servers are set to just discard them, which is done through a filter access rule. Suggest setting up a round robin traffic counter for ping and you will get laughed out of the room. Do or don't do. What will happen, occassionally is that ping will be allowed from specific watchdog addresses. What will happen, more often is you will have traffic shaping to prioritze traffic. What isn't done is what you suggested was standard practice. And still no answer on step-back eh? Whats a matter google foo weak?
< Message edited by Phydeaux -- 11/19/2013 4:42:59 AM >
|