Liquid Telecom fighting off a DDoS attack measuring over 100Gbps

So all you need to do a "massive" DDoS these days is about a thousand compromised 100Mbps consumer connections.
 
"Massive 100GBs"... Hardly massive. We did that amounts over 16 years ago with with your average IRC fight.
 
Getting 5Mbps international download on a 200Mbps line.
There are definitely still issues.
 
  • Like
Reactions: Jan
Yeah... no. He's just trying to be edgy. Everyone on the Internet is a comedian now.

You didn't need a tonne of bandwidth to DDoS someone on a 56kbps modem.
 
Lol, wonder what these 'hackers' would do if the world shuts down the Internet and move back to telephones, TV's, print media and brick & mortar stores for doing business....
 
Actually about 80k open resolvers.

Ah, that's the el-cheapo attack, DNS amplification. You can easily find 80k open resolvers on the internet.

If you have a little bit more money, you can get a botnet of 1000 x 100 Mbps connections for $25 an hour. So only $600/day to launch a "massive" DDoS on an ISP.
 
Ah, that's the el-cheapo attack, DNS amplification. You can easily find 80k open resolvers on the internet.

If you have a little bit more money, you can get a botnet of 1000 x 100 Mbps connections for $25 an hour. So only $600/day to launch a "massive" DDoS on an ISP.

Even with the DNS amplification attack you would need to have access to a relatively big botnet to really push those packet numbers up. Big botnet plus a list of 100k open resolvers and information to strike an isp on the correct range targeting routers in the network at critical points you can bring it down.


Just filling transit links with capacity can also work if you want to hurt the ISPs pocket a bit.
 
"Massive 100GBs"... Hardly massive. We did that amounts over 16 years ago with with your average IRC fight.
100Gigabyte a second you say.

Firstly, that is 800 Gigabits a second. 16 years ago when the average internet speed world wide was 350 kbps about, meaning upload speeds would have been closer to 128kbps (it was likely way less). This is an average and doesn't paint the full picture. That would mean for you to have performed an attack of that magnitude you are claiming you'd have needed a grand total of 6250000. Given we are talking about 2003, I can really say you have no idea what you are talking about at all.
 
100Gigabyte a second you say.

Firstly, that is 800 Gigabits a second. 16 years ago when the average internet speed world wide was 350 kbps about, meaning upload speeds would have been closer to 128kbps (it was likely way less). This is an average and doesn't paint the full picture. That would mean for you to have performed an attack of that magnitude you are claiming you'd have needed a grand total of 6250000. Given we are talking about 2003, I can really say you have no idea what you are talking about at all.
Well, you could probably have done it with DNS amplification attacks or other forms.
Also, not everyone was stuck on DSL at the time, fiber did exist.
This is from Wikipedia:

And I can quote from Akami as well that they upgraded their DNS servers from 20Gbps to 200Gbps in Q2 of 2008.
 
Well, you could probably have done it with DNS amplification attacks or other forms.
Also, not everyone was stuck on DSL at the time, fiber did exist.
This is from Wikipedia:


And I can quote from Akami as well that they upgraded their DNS servers from 20Gbps to 200Gbps in Q2 of 2008.
What would the odds be of Akami being used for an amplification attack, or even a 1Gbps FTTH service not being secured? I know in South Africa its a regular occurrence to see routers with default usernames and passwords, but is this common all over the world? Even at a gigabit that means that they would have needed to have access to at least 800 FTTH connections, and even then we can't determine what the upload was of Kansai Electric Power?
 
What would the odds be of Akami being used for an amplification attack, or even a 1Gbps FTTH service not being secured? I know in South Africa its a regular occurrence to see routers with default usernames and passwords, but is this common all over the world? Even at a gigabit that means that they would have needed to have access to at least 800 FTTH connections, and even then we can't determine what the upload was of Kansai Electric Power?
I meant from Akami's state of the internet report that Japanese DNS providers upgraded to 200Gbps.
With it being common all over the world, probably does, and Cisco for example really doesn't have a very good track record if you keep to the defaults: https://www.tomshardware.com/news/cisco-backdoor-hardcoded-accounts-software,37480.html
Which I bet is what happened at Liquid Telecom, so easy exploits.
 
Yep! It's the Japanese! Pissed off because we beat them in the rugby! :p
 
100Gigabyte a second you say.

Firstly, that is 800 Gigabits a second. 16 years ago when the average internet speed world wide was 350 kbps about, meaning upload speeds would have been closer to 128kbps (it was likely way less). This is an average and doesn't paint the full picture. That would mean for you to have performed an attack of that magnitude you are claiming you'd have needed a grand total of 6250000. Given we are talking about 2003, I can really say you have no idea what you are talking about at all.

Easy game. I know quite clearly what I'm talking about. Why are you only calculating in South African zombie machines?
 
Top
Sign up to the MyBroadband newsletter