Copy Link
Add to Bookmark
Report

The Discordant Opposition Journal Issue 04 File 07

  

::::::::::::::::::::::::::::::::::::::::::::::::::::::April/99
::: The Discordant Opposition Journal ::: Issue 4 - File 7 :::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

:Distributed Attacks:
cronus

Many high profile targets are getting attention from hacking groups.
In past hackers would be individuals that targeted a specific machine
or network. If hackers were involved in groups, the partnership would
more likely involve information swapping and discussion of different
techniques. But modern day 'Tiger Team' groups actually co-ordinate in
probing the system and gather huge amounts of information about the
systems integrity.

Dozens of hackers working together with a common goal, amassing huge
amounts of data about the target system. Port scans, bandwidth usage
and even network scans. All the information can be later combined to
give a more detailed account of the system. This is the definition of
a distributed attack.

Using any form of basic encryption, the group can communicate and
co-ordinate. No form of encryption is perfectly secure. But e-mails
that are encrypted with PGP will sufficiently protect anyone's plans
OF network intrusion. These hacking groups can use any form of basic
encryption or alternative communication to hide their intentions. And
since hackers aren't working on any time schedule they can draw out
the probing process and eradicate the fear of drawing attention to
their work.

The timing of any attack can be, and in the past has been, handled
with military precision. By co-ordinating with each other, the hackers
can each probe with a single connection. When each hackers results
are combined, a more general view of the system starts to become
clear. And as said before, the whole attack can be drawn out. The
longer the probing of the server takes, the less likely the admin
will notice. Or the alternative approach could be taken. The whole
process could take place in a matter of hours and be done before
anyone would have a chance to notice.

The more spread out the attackers, the more diverse the entries in
the system logs. The main way a system administrator would know that
their system was being probed would be the system logs. The logging
of connections and data transfers is done by default on most systems.
If the probes come from multiple sources, the likely hood of detection
is decreased.

Because no one hacker is probing the system, the logs would reflect
multiple connections without any seamless thread of consciousness. The
lack of coherent thought in the probing would make detection of the
probe more difficult. Although the mentalities of the individuals
involve in the attack would be based on the common goal. The range of
tactics and ideas to probe the weaknesses of the system will improve
the chances of finding a hole and also help hide the attack.

Anyone with a server that's online or a network of online machines
needs to be aware of the threat of distributed attacks. I have given
a general outline of the distributed attack. To protect against it
is simply a matter of more directed attention at your system.

... intoxicated with the madness ...
cronus (at) iol (dot) ie
___________ ____ ____ __ __ ______
_/ ___\_ __ \/ _ \ / \| | \/ ___/
\ \___| | \( <_> ) | \ | /\___ \
\___ >__| \____/|___| /____//____ >
\/ \/ \/
http://homepages.iol.ie/~cronus

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

guest's profile picture
@guest
12 Nov 2024
It is very remarkable that the period of Atlantis’s destruction, which occurred due to earthquakes and cataclysms, coincides with what is co ...

guest's profile picture
@guest
12 Nov 2024
Plato learned the legend through his older cousin named Critias, who, in turn, had acquired information about the mythical lost continent fr ...

guest's profile picture
@guest
10 Nov 2024
الاسم : جابر حسين الناصح - السن :٤٢سنه - الموقف من التجنيد : ادي الخدمه - خبره عشرين سنه منهم عشر سنوات في كبرى الشركات بالسعوديه وعشر سنوات ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
6 Nov 2024
Thank you! I've corrected the date in the article. However, some websites list January 1980 as the date of death.

guest's profile picture
@guest
5 Nov 2024
Crespi died i april 1982, not january 1980.

guest's profile picture
@guest
4 Nov 2024
In 1955, the explorer Thor Heyerdahl managed to erect a Moai in eighteen days, with the help of twelve natives and using only logs and stone ...

guest's profile picture
@guest
4 Nov 2024
For what unknown reason did our distant ancestors dot much of the surface of the then-known lands with those large stones? Why are such cons ...

guest's profile picture
@guest
4 Nov 2024
The real pyramid mania exploded in 1830. A certain John Taylor, who had never visited them but relied on some measurements made by Colonel H ...

guest's profile picture
@guest
4 Nov 2024
Even with all the modern technologies available to us, structures like the Great Pyramid of Cheops could only be built today with immense di ...

lostcivilizations's profile picture
Lost Civilizations (@lostcivilizations)
2 Nov 2024
In Sardinia, there is a legend known as the Legend of Tirrenide. Thousands of years ago, there was a continent called Tirrenide. It was a l ...
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT