After the huge DDoS attack on DYNdns earlier this week marking one of the largest DDoS attacks in history I decided to make a video to help educate the public on why the media is always getting it wrong when they refer to DDoS attackers as hackers and also what we can do to stop these little script kiddies with nothing better to do from creating large bot networks and attacking services.
▼ Internet of Things devices ▼
I completely forgot to talk about Internet of Things devices (IOT). These are things like your webcams, smart fridges, routers, cell phones, toys, etc. These devices all run servers that can be accessed externally and if you don't change the default passwords or cut them off from the outside network on your router they can become vulnerable to being rooted and becomes bots on these DDoS networks so make sure you always change the default passwords on 100% of the IOT devices you have in your house. Go do it now! If you enjoyed the video please give it a 'like'.
▼ All Video/Audio equipment I used to shoot this YouTube video ▼
Sony FDR-AX33 Camera - https://www.amazon.com/gp/product/B00R5LH9G0/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00R5LH9G0&linkCode=as2&tag=barnacnerdg08-20&linkId=6aeb7bbe6c4ac3db64cf0138bb3fbd15
Sennheiser MKE 44 Mic - https://www.amazon.com/gp/product/B01EM70BE6/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B01EM70BE6&linkCode=as2&tag=barnacnerdg08-20&linkId=fed92212a8adba0f795952c4a4bd4775
Gray Card (WB) - https://www.amazon.com/gp/product/B00HT9MA1W/ref=as_li_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN=B00HT9MA1W&linkCode=as2&tag=barnacnerdg08-20&linkId=b3519bb28b4b940fb169694f1dfd0d27
▼ DDoS Attack Monitoring Sites ▼
▼ Virtual Machine Software ▼
Virtual Box (Install Windows on a VM) - https://www.virtualbox.org/
▼ Follow me on social media (updated daily) ▼
Twitter - http://twitter.com/barnacules
Instagram - http://instagram.com/barnacules
Facebook - http://facebook.barnnerd.com
Blog - http://blog.barnnerd.com
▼ Donations help me feed my family so I can spend everything else on videos like this (Thank you!) ▼
▼ Purchase a Rad Power Bike and join me on my weight loss journey ▼
▼ Get my Windows 10 - We're Watching T-Shirt ▼
^^ - Use code 'BarnaVlog for $2 off order
▼ Get my Shut up and take me T-Shirt ▼
http://bit.ly/ShutUpBlack (Black Shirt)
http://bit.ly/ShutUpGreen (Green Shirt)
^^ - Use code 'BarnaVlog for $2 off order
▼ Apple iBuggy T-Shirt ▼
http://bit.ly/iBuggyBlack (Black Shirt)
http://bit.ly/iBuggyBlue (Blue Shirt)
http://bit.ly/iBuggyHeavyMetal (Grey Shirt)
^^ - Use code 'BarnaVlog for $2 off order
▼ Discount on GT Omega Racing Office Chair ▼
GT Omega Chairs @ http://bit.ly/1lA4h4K
Use code 'NERDGASM' at checkout!
▼ Join My [email protected] Team And Let's Find A Cancer Cure ▼
Barnacules Nerdgasm Team # 231300
Download Client @ http://folding.stanford.edu/
** Top 10 contributors shown on Twitter weekly!
▼ Questions & Answers ▼
Q) My router has DDoS protection, does that mean I don't have to worry about this?
A) No, the DDoS protection on your router just detects when malicious packets are incoming and ignores them. These packets still need to be received by your modem or router before they can be rejected so you can still have your connection overwhelmed which means by definition this defense is a marketing gimmick only and will only defend again very old style DDoS attacks that relied you responding to traffic.
Q) Will a Virtual Machine protect me 100%?
A) No, it will be a huge leap forward but realize that some malware might actually detect if it's in a VM and behave to some extent so you think it's safe to move it to a real machine. So make sure you keep everything on the VM that you suspect came from a source that might not be trustworthy (torrent sites, warez, movies, music, etc).
Q) Can DDoS make my internet bill go up?
A) Yes, if you have metered or limited the internet like on your cell phone or home cable modem and the DDoS attacker hits you hard you could run out your limit and go into overtime bandwidth and have to pay a premium for each gigabyte over depending on your provider. Some providers give you unlimited and in that case, you will be okay but if you keep coming under attack they may turn off your internet for eating too much bandwidth 24/7.
Q) What about bot nets comprised of IOT devices like smart fridges, routers, doorbells, smart fridges, home security systems, etc?
A) I consider those all to fall under 'computer' and are still infected via mallicious software or external connections. The biggest way to protect all of your devices from becoming a part of the BOT net is to protect your internal network to prevent these devices from accepting external connections and changing all of their default passwords to something complex.
What he said about downloading movies and shows is false. In-fact I don't think people who download those have ever seen a self extracting archive. The files tend to come as individual video files or regular split archives. Maybe in the early days of torrenting it was more common but in the recent years it hasn't been the case.
This whole "more often than not" seems to be an excuse to be the nanny he says he doesn't want to be :/.
I'm not even gonna watch this stupidity so you don't get views. You're saying crafting a RAT, infecting thousands of computers, and running botnet software undetected on those computers isn't "hacking" youre a god damned inbred imbecile. fat retard
The whole dont pirate because....... Is COMPLETE BULLSHIT. Maybe if you Google something like Super Douchey Site that Always Includes Malware With Every File then download from them that line of logic might be true.
Most of the time DDoSers are script kiddies but sometimes it is an organization that has discovered a flaw in something, exploits that flaw to create a massive botnet and then they use that botnet to take down sites.
what would the best security methods for computers? people say use antiviruses and anti malware, is virus and malware the same thing? i have windows defender, is that not all i need? what would i do if i have hidden harmful programs on my computer?
You can optimise ddosing, my for example using the server query functions, instead of just sending garbage data. So skilled people are better at ddossing than unskilled people. I think a Distributed Denial of Service attack could also be guys who figure out how to overload a servers cpu/ram/memory read resources by for example telling tge server to create an account, which might require a lot of proccessing on the server side but little bandwidth and resources on the attacker side. There is also stuff like reflection attacks, where you amplifie your bandwidth going to a server(just google ddos reflection attack )
I have a question on if it's possible for somebody to attack my modem while I play on PS4. I have a theory that somebody is sabotaging me... my connection is usually perfectly fine but something ends up happening in my online gaming where I cant aim at players. It's almost pulling my aim away as I aim at them. My connection feels so bugged out as well even though it was absolutely fine.
for starters nulling someone with a dos or ddos attack (ddoses are beter with over 30k bots) requires a manual bot attack that means you need to send a malicious file with a bot crypt which could be considered a hacker and script kiddies script theres a difference xss scripting or batch scripting for into the category and hackers dont exploit weakness thats what a malware does hackers manually back door into sites by mirror logging AND using scripts that capture cookies
you need to learn
a DoS attack btw is not nessesarily 'overloading their connection'. any attack that disables the target qualifies... making them echo the hayes modem escape code + hangup sequence in clear text, winnuke (oob data to tcp 137), that sorta thing is a DoS too.
as for that attack on dyn you are referring to. if i understand correctly that was done using the vxworks debug port on MIPS based cablemodems and things like that.. which already qualifies whomever did it as not some 'stupid script kiddie' as using that (afaik) only allows you to download the entire ram or sections of the ram of the target device and upload ram back to the -still running- system. nessesitating 1) a proper understanding of the MIPS cpu instruction set 2) a proper understanding of vxworks ip stack library calls 3) on-the-fly creating customized new-memory-maps for each target device and somehow tricking the running code to jump to your new code without crashing the whole fucking thing. (and most people that go through all that trouble would rather spend it on something a bit more profitable than a ddos attack, such as having a few million cable modems mine xmr cryptocurrency for you for a few years to come ;)
lol. all the tor exit nodes in the world won't make a dent in any properly connected network. also who the hell still bothers to hack together a botnet. that's sooo 1990s. nowadays it's mostly just paid transit of places that do not have BCP 38 source filtering in place. let's just say that a few 100k to a few million dollars investment is perfectly acceptable to take an enemy out for a couple of weeks. "hacked botnets" are generally more often used for cryptocurrency mining. for ddos people just pick whichever big clueless isp they can find and just pay to rent servers (preferably picking big clueless isps without bcp 38 in place ;)
in the late 90's we had DSL... i was like 12... i would download all these "nukes" (its what these ddos tools were called back then) and use them all to knock my "foes" off the internet... it gave me a lot of lolz
Also it's alot harder to boot large companies now. After a few too many requests it blocks your ip and doesn't allow you to access the site until either a certain amount of time or until you solve a recapcha. Also, If I saw my network usage meter go up for no apparent reason, and alot of it is data being sent, It's called I simply turn the wifi off :)
Some kid tried to boot me, and his booter was so trash he knocked out my internet for less than 10 seconds LOL. It wasn't even long enough to disconnect me from the game either so it was prety easy to report him for for attempting to boot.
ugh... a real ethical hacker does not care of pity arguments/lectures.
You either are a 1 or you is a 0 simple.
bet none of you in here, can name 5 scanning servers though. lol let alone ssh bypasses
i'm out deuces.
You can DDOs anybody it doesn’t matter whether your Internet slow or fast it does not matter whether the attackers Internet is better than yours you should really get an education on fucking hacking before you run your mouth and actually it is considered hacking the United States government considers it hacking So shut your fat fucking chub mouth and lips up because you don’t know what the fuck you’re talking about get a fucking grip on yourself
I have a funny story. Me and my friend were playing COD and some kid threatened to Ddos us we didn’t really care because we both had vpns but my friend kinda got a little triggered at the little kid so he went on to the Microsoft website and brute forced the kids password and got his parents credit card details and then spent $100 on porn sites 😂
Most people won't be able to ddos other someone else because there internet isn't super fast and a botnet ddos is much more effective when u have like 15 infected computers sending huge amount packets to a server
You could also make a bot network of zombie virtual computers that do the same thing as using a bunch of random peoples computers but not network servers use a lot of power and a lot of bandwidth and are expensive but I know someone that has one
Easy client-side fix. On new windows install, go get a firewall that blocks ALL new connections and learns trusted connections as you go, manually specifying what to allow first time. Then go install all the pirated content you want. Now if your offline pirated game wants to phone home, you know you got malware, block that shit.
Your computer would still be infected but won't communicate anything to the bad guys so not only will DDOS attacks be prevented, but your PC info won't leave your PC. You could also try a VM and do the same thing and just play your AIDS video games in a VM. I recommend that.
About once a year you may also want to re-install your windows or watch Wendell's level1tech channel on how to play games on linux and get yourself some $ to avoid pirating. Really doesn't get much safer than that. I suppose you can install pirated games on linux which wont really cause mayhem as most malware is scripted for windows and not linux
This Kid sounds even more like a Script Kiddie that does not know what he's talking about lmao WHO THE FUCK USES HIS OWN HOMECONNECTION TO DO SOMETHING ILLEGAL
Botnets are realy used for that or Govermemtservers that got Hijacked
Rumor Use Lanc to pull Ip's to boot There's free stresser's but you may just make whoever your attacking lag so I recommend buying Wifi RIP it costs 5$ a month or 10$ a month for stronger attacks but if you really wanna attack someone either buy or code a botnet
Or just post the IP on this comment and I'll help you.
Wäsche waschen und trocknen ist eine der wichtigsten Hausarbeiten. Ihre Lebensqualität definiert sich über Ihr Wohlbefinden. Und das hat auch mit Ihrer Wäsche zu tun. Sie müssen sich in Ihrer Wäsche wohlfühlen. Dazu muss man diese regelmäßig waschen, ohne sie zu beschädigen und auch die Farben sollen erhalten bleiben. Das einmalige Lieblingswäschestück soll genauso aus der Waschmaschine kommen, wie es hineingelegt wurde – nur sauber. Dasselbe gilt für den Wäschetrockner. Ihre Wäsche soll den Waschgang beziehungsweise das Trocknen einwandfrei überstehen. Waschmaschinen und Trockner müssen daher fehlerfrei und zuverlässig funktionieren. Deshalb sollten Sie hier auf erstklassige OBI Qualität achten. Mit der OBI Online-Bestellung können Sie sich jetzt eine neue Waschmaschine oder einen neuen Wäschetrockner sichern. So gehen Sie auf Nummer sicher und Ihre Wäsche wird es Ihnen danken. In der OBI Ideenwelt finden Sie weitere nützliche Tipps rund um den Haushalt.
Mit OBI Waschmaschinen waschen.
Der OBI Online-Shop bietet Ihnen verschiedene Waschmaschinentypen unterschiedlicher Markenhersteller wie zum Beispiel Siemens oder Gorenje. Diese stehen für Qualität und Zuverlässigkeit. Mit einer Online-Bestellung können Sie sich jetzt selbst davon überzeugen. Sie haben die Wahl zwischen Front- und Topladern. Die Maschinen sind in verschiedenen Energieeffizienz- und Preisklassen zu Hause. So ist sicher für jeden Geschmack und Geldbeutel die richtige Maschine vorhanden.
Wäschetrockner in großer Auswahl.
Auch die Wäschetrockner aus dem OBI Online-Shop sind Produkte unterschiedlicher anerkannter Hersteller wie beispielsweise Bosch oder Gorenje. Hier können Sie sich ebenfalls zwischen Front- und Topladern entscheiden. Toplader sind besonders bei mangelndem Platz praktisch. In für Trockner typischen Räumen, wie Kellern, ist genau das häufig der Fall. Durch die große Vielfalt ist sicher für alle Anforderungen das richtige Gerät verfügbar – bequem per Online-Bestellung.
* Die angegebenen Verfügbarkeiten geben die Verfügbarkeit des unter „Mein Markt" ausgewählten OBI Marktes wieder. Soweit der Artikel auch online bestellbar ist, gilt der angegebene Preis verbindlich für die Online Bestellung. Der tatsächliche Preis des unter „mein Markt“ ausgewählten OBI Marktes kann unter Umständen davon abweichen. Alle Preisangaben in EUR inkl. gesetzl. MwSt. und bei Online Bestellungen ggf. zuzüglich Versandkosten. UVP= unverbindliche Preisempfehlung des Herstellers.