Did Lizard Squad Hit PSN/Xbox Live :noah: *updated*

WhatsGoodTy

Ya feel me
Joined
Jul 29, 2013
Messages
15,862
Reputation
3,480
Daps
42,620
You have to be a compete utter loser to do this. fukk lizard squad and fukk that fat ass Kim dotcom dude. Sony better drop the biggest I'm sorry letter and give out extra psn or a free game. Or even extend some of the deals. This is outrageous you make all this money,but can't stop some cacs who haven't seen the Sun in God knows how long? I'm hoping some irl info on these fools get leaked cause trust hands getting thrown
 

Fatboi1

Veteran
Supporter
Joined
May 6, 2012
Messages
60,632
Reputation
7,970
Daps
111,051
Read this for a good analogy of how this DDOS attack work and see how these armchair analysts talking that "Well Sony/MS MAKES US PAY AND CANT'FIX It11!!?!" sound uninformed.

Imagine a shopping mall. By definition, anybody can enter the mall and then browse the shops. It is public. The shops are expecting people to come by, look at the displays, maybe enter and then buy things.

In the mall, there is a shopkeeper, who sells, say, computers. Let's call him Jim. He wants people to come by and see the computers and be enticed into buying them. Jim is the nice guy in our story.

Let there be Bob. Bob is a disgruntled nihilist who hates Jim. Bob would go to great lengths to make Jim unhappy, e.g. disrupting Jim's business. Bob does not have many friends, but he is smart, in his own twisted way. One day, Bob spends some money to make the local newspaper publish an ad; the ad states, in big fonts and vivid colours, that Jim runs a great promotion at the occasion of his shop's tenth birthday: the first one hundred customers who enter the shop will receive a free iPad. In order to cover his tracks, Bob performs his dealings with the newspaper under the pseudonym of "bob" (which is his name, but spelled backwards).

The next day, of course, the poor Jim is submerged by people who want a free iPad. The crowd clogs Jim's shop but also a substantial part of the mall, which becomes full of disappointed persons who begin to understand that there is no such thing as a free iPad. Their negativeness makes them unlikely to buy anything else, and in any way they cannot move because of the press of the crowd, so business in the mall stops altogether. Jim becomes highly unpopular, with the ex-iPad-cravers, but also with his shopkeeper colleagues. Bob s******s.

At this point, Jim contacts the mall manager Sarah. Sarah decides to handle the emergency by calling the firemen. The firemen come with their shining helmets, flashing trucks, screaming sirens and sharp axes, and soon convince the crowd to disperse. Then, Sarah calls her friend Gunther. Gunther is a son of German immigrants, a pure product of the US Melting Pot, but more importantly he is a FBI agent, in charge of the issue. Gunther is smart, in his own twisted way. He contacts the newspaper, and is first puzzled, but then has an intuitive revelation: ah-HA! "bob" is just "Bob" spelled backwards ! Gunther promptly proceeds to arrest Bob and send him meet his grim but legal fate before the county Judge.

Finally, in order to avoid further issues with other nihilists who would not be sufficiently deterred by the vision of Bob's dismembered corpse put on display in front of the mall, Sarah devises a mitigation measure: she hires Henry and Herbert, two mean-looking muscular young men, and posts them at the mall entries. Henry and Herbert are responsible for blocking access should a large number of people try to come in, beyond a given threshold. If a proto-Bob strikes again, this will allow the management of the problem on the outside, in the parking lot, where space is not lacking and crowd control much easier.

Morality: a DDoS cannot be prevented, but its consequences can be mitigated by putting proactive measures, and perpetrators might be deterred through the usual, historically-approved display of muscle from law enforcement agencies. If botnets become too easy to rent, predictable consequences include increased police involvement, proactive authentication of users at infrastructure level, shutting off of the most disreputable parts of the network (in particular Internet access for the less cooperative countries), and a heavy dose of disgruntlement and sadness at the loss of a past, more civilized age.
http://security.stackexchange.com/questions/33811/ddos-impossible-to-stop


Denial of Service
Definition

A Denial of Service is an event, or series of events, which overwhelms part(s) of an infrastructure such that the infrastructure can no longer accomplish its intended function.

The Phone Analogy
It's equivalent to asking 1000 people to call the same individual's phone number, repeatedly and over. That person - let us call her Alice - would be unable to use her phone, as the volume of calls would overwhelm the line.
One comment I've gotten when using this analogy is "Why doesn't Alice just not answer the phone unless she recognizes the number? Or just turn the phone off?" so rather than stretch the analogy adding that caller ID doesn't work or that she can't turn it off I change it a bit: make Alice the receptionist at an office. She can't stop answering the phone without losing her job and not only is her phone useless she can't greet people who walk in the door, tell them where the bathroom is, file papers, notify her boss that an appointment is there, etc.

The Motorway Analogy
On a long-distance car journey, you probably start out on a small road, turn onto a main road, then join a motorway for most of your journey. When you get near to your destination, you repeat the pattern in reverse, turning onto successively smaller roads until you arrive at your destination. Your route starts along a narrow, low-capacity link, transfers to a high-capacity link, and then back to a low-capacity one near your destination. Normally, this is ok because although there are many cars on the motorway, they are all going to different places, so there are only a few cars using each of the smaller roads.
When there is a big music festival on, though, a large number of cars from the motorway all decide to leave at the same junction and take the same route along minor roads to the same destination, causing a traffic jam and preventing locals from reaching their homes in nearby villages. This convergence of traffic from many points on the network is like a distributed denial of service attack online. The problem comes at each point where a wide pipe (a motorway or internet backbone) feeds into a smaller one (a country road or an individual company's internet connection). If the wide pipe feeds the narrow one more traffic than it can accept, then congestion occurs. (On the road, the cars wait in queues, on the internet the packets will be discarded if they cannot be fed through in a reasonable time-frame).
This is why a DDoS attack can be so hard to prevent, because the problem occurs not just in one place, but also at multiple interfaces across the internet infrastructure, over which you as the victim have no direct control.

DoS: Intent or Accident?
It's important to note that DoS attacks are not only caused with malicious intent; denials of service can happen as a result of many otherwise benevolent causes as well. The "Slashdot Effect" is a well-known Web-DDoS problem. A traffic jam is a real-world example of a DDoS attack which is not caused (in most situations) by malicious activity, just an overwhelming of the roadway.
http://www.yousicurity.com/2009/10/security-analogies.html

DENIAL OF SERVICE: IT'S LIKE DIALING THE SAME PHONE NUMBER OVER AND OVER
Let's start with the basics. The simple concept behind a "Denial of Service" attack (note we're not talking distributed yet) is to overuse the service in question (for example, Twitter) to the point where it becomes unavailable to others. Think of this metaphor: if I call your home telephone over and over again, and you lack call waiting, other callers can't get through. As long as I keep calling, I'm denying service to others, thus implementing a "Denial of Service" (or DoS) attack. Now, in practice this is close to impossible with an internet service like Twitter, because, not to stretch the metaphor too far, they have a lot of phone lines. There's no way one computer could use the Twitter service so heavily that it would affect other users.

There's also the little matter that a single-line Denial of Service attack is pretty easy to defend against: you just block the offending computer (or caller, in our analogy). But things are about to get more complicated.

LET'S GET DISTRIBUTED
So if a standard Denial of Service attack isn't going to shut down the site, let's imagine what would happen if millions of computers began to pound on Twitter.

If a very large number of computers started hitting the service repeatedly, it could get to the point where the service became unavailable to others. When you distribute the attack among a number of attacking computers, that's called a Distributed Denial of Service Attack. That's what's happening right now. Most distributed attacks happen from computers on different networks all around the world, which makes it harder to isolate and block them. They also may look, to the server, much like normal traffic -- so it's hard to know what to block and what to let through.

BUT WAIT...DON'T MILLIONS OF PEOPLE USE TWITTER EVERY DAY ANYWAY?
Well, yes. Twitter is designed for millions of people to constantly hit its servers, posting updates, reading others' updates, and so on. So how can it collapse under the strain of a DDoS? Well, the short answer is that a DDoS provides way more traffic than Twitter usually receives, and it's likely to be targeted on the most resource-intensive operations on the site (for example, the computers performing the attack may be constantly trying to create new accounts, reset passwords, download long lists of tweets, post new tweets over and over, or other operations that require the server to do a bit of real work).

A DDoS attack requires a lot of computers to be effective. Generally these days attackers use "botnets," or virtual armies of computers controlled by a virus, that are then centrally commanded to do something nasty -- like all hit Twitter at once. The owners of the computers generally don't even know that their computers are part of the botnet, since the virus operates invisibly in the background. The biggest botnets may well contain millions of computers, although it's hard to measure these things because the computers' owners don't know they're infected.

It's impossible to tell at this early stage who is behind the DDoS -- whether it's a prankster, an organized crime ring (these things do happen -- malicious groups have been known to threaten to DDoS a major site and hold off only when paid protection money), or even a politically-motivated group. (Can you think of an international political cause that has been linked to Twitter lately? Exactly.)
http://mentalfloss.com/article/22451/twitter-down-whats-distributed-denial-service-attack

Normal Traffic



DDOS traffic
 
Last edited:

2 Up 2 Down

Veteran
Joined
May 4, 2012
Messages
27,854
Reputation
2,692
Daps
67,044
Reppin
NULL
7bhWc4c.gif


so SONY can prevent these attacks huh????
Don't believe any company can.
 

AkaDemiK

I Love Hip-Hop
Joined
Apr 30, 2012
Messages
42,179
Reputation
6,160
Daps
106,158
the xbox seems fine, other than not being able to view the friends list
 

Tha Carter

The God
Joined
Aug 26, 2014
Messages
616
Reputation
290
Daps
1,619
Reppin
Nobody, just me
These stupid fukks don't know Sony has been losing money for awhile now, and don't know nikkas are probably trying to get a refund on their PS4, losing more money in the process...

Xbox 360 was raping the shyt outta of the PS3 last Gen until the PS3 was able to compete...

Not making a profit off their shytty laptops and phones

And selling the PS4 at a loss.

Nice flawed argument Lizard squad :skip:
 
Top