1.

Solve : New webber?

Answer»

Ok cheers KPac don't want to confuse myself anymore than is needed. Cheers for the input though.Okay then. If you ever want to look for it though, Google is your best friend (or maybe Yahoo). Quote

I think I get it now. So it confuses the website into thinking that another server is requesting the page and repeats this continuous through 'zombie pc's' making the site use up lots of memory dealing with these multiple requests effectively disabling the site's ability to deal with real traffic. I'm probably missing the point but I think I understand what your saying.

Exactly! except, it isn't just memory, but network bandwidth, server CPU time, etc.


By "Zombie PCs" I meant the group of PCs a hacker controls, often without the USER knowing (well, usually without them knowing) via trojans and whatnot, they get control over the REMOTE PC and compromise it, and often times they will launch further attacks from that PC, making it difficult to TRACE the real attacker. All of this happens right under their nose! In any case, once the hacker has control over them, he can get them all to do the same thing- in this case, request a web page from a server- using a crafted packet that uses the wrong "return address". So the server get's these millions of requests from PCs all over the world, and each one identifies it's origin as the other site. the server dutifully sends that other site the data all these PCs requested, which confuses the bejesus out of the recipient, since it never requested it.

So both if the servers will have their capacity reduced. Generally big-name companies not only have multiple servers but also a method of detecting these illegitimate packets, not to mention other checks and balances, so really the hacker will need to be far more clever, perhaps <<>>. Do I have to remove malicious content from that post?

Quote
perhaps REDIRECTING the request to proxy servers all around the world which subsequently all redirect that response to a single server elsewhere.
That might give someone ideas...except, they would need to be in control of the proxy as well.

Besides, I'm just making half of this up as I go along. I'm surprised I've gone this long without some abstracted reference to peanut butter, actually.So and I'm not asking how, but just the basic idea of how it's done. The proxy is the go-between for the client and the server yes? It's like a filter station? How would any body take control of something like that. As I said I don't want the method just the theory. I find this very interesting as it explains a lot of what you read about. I mean is the proxy not controlled by the ISP?If you have your own server, you can set up a proxy.But will they not have there own Proxy to filter out your ATTEMPT?a proxy is just a computer that relays information from a client to some other server. Basically, it "hides" the client from the actual server, since as far as the server is concerned it's connecting to the proxy. Same goes for the client, IE, if an ISP were to block all web pages from competing firms (LOL) then running through a proxy, the ISP will simply see it as such- connecting to the proxy IP, which is not a competing firm. but then the proxy is simply relaying information from that "banned" web page.


getting control of a proxy- assuming you don't own it, is the same as any other PC on the internet.Got you thanks BC makes a lot more sense now. Cheers BC, KPac it was good to learn something new.





Discussion

No Comment Found