Difference between revisions of "DDoS Attacks/takedowns"
Line 1: | Line 1: | ||
Its rare that the staff of the network here will take down a botnet. No one here randomly hunts for malware and does analysis on it, there are people who get paid for that. Instead, here, we've documented a list of subjects who have attacked this network (or the author of their takedown page directly) in combination with the techniques they use to propagate their botnets. In some cases, you may find active-response scripts triggered by tcpdump, in others, you may find entire botnet [[IP address]] listings and their associated exploits. | Its rare that the staff of the network here will take down a botnet. No one here randomly hunts for malware and does analysis on it, there are people who get paid for that. Instead, here, we've documented a list of subjects who have attacked this network (or the author of their takedown page directly) in combination with the techniques they use to propagate their botnets. In some cases, you may find active-response scripts triggered by tcpdump, in others, you may find entire botnet [[IP address]] listings and their associated exploits. | ||
− | Each takedown page is named after its respective botnet maintainer. | + | Each takedown page is named after its respective botnet maintainer. By attacking our network, they have agreed to forfeit our [http://www.blackhatlibrary.net/Security101_-_Blackhat_Techniques_-_Hacking_Tutorials_-_Vulnerability_Research_-_Security_Tools:Privacy_policy privacy policy]. |
== Current Takedowns in Progress == | == Current Takedowns in Progress == |
Revision as of 18:48, 16 July 2012
Its rare that the staff of the network here will take down a botnet. No one here randomly hunts for malware and does analysis on it, there are people who get paid for that. Instead, here, we've documented a list of subjects who have attacked this network (or the author of their takedown page directly) in combination with the techniques they use to propagate their botnets. In some cases, you may find active-response scripts triggered by tcpdump, in others, you may find entire botnet IP address listings and their associated exploits.
Each takedown page is named after its respective botnet maintainer. By attacking our network, they have agreed to forfeit our privacy policy.
Current Takedowns in Progress
There are no denial-of-service attacks taking place against our network at this time.