hightech-it.blogspot.com
March 2013 ~ Hightech-IT
http://hightech-it.blogspot.com/2013_03_01_archive.html
All you need to know about today's technology and IT news! Sunday, March 31, 2013. Instagram Photos Now Affect Your Klout Score. Now your Instagram photos will play a role in your Klout. Score Klout has allowed users to connect their Instagram account to Klout for some time, however, those photos did not play a role in a person’s overall score. Now those photos will influence your score, and your most popular pictures will appear in the Klout Moments section of your Klout profile. Saturday, March 30, 2013.
blog.cloudflare.com
The DDoS That Almost Broke the Internet
https://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet
The DDoS That Almost Broke the Internet. This morning published a story about the Spamhaus DDoS attack and how CloudFlare helped mitigate it and keep the site online. Calls the attack the largest known DDoS attack ever on the Internet. We wrote about the attack last week. At the time, it was a large attack, sending 85Gbps of traffic. Since then, the attack got much worse. Here are some of the technical details of what we've seen. Peering on the Internet. The inter in Internet refers to the fact that it i...
jonsblog.lewis.org
Jon Lewis's Blog
http://jonsblog.lewis.org/internet/routing
Thu, 28 Mar 2013. BCP 38 - Or why all edge networks need some form of valid prefix filtering. The Internet has been dealing with amplification attacks dependent on source address spoofing at least as far back as the mid to late 1990s. Smurf attacks. The common thread here is that both Smurf and DNS amplification attacks wouldn't be possible if the attackers couldn't spoof their target's IP address. With the above interface and route statement, only traffic received on FastEthernet1/0 with source addresse...
capa3.es
seguridad | capa3.es
https://capa3.es/category/seguridad
Seguridad – capa3.es. Blog de Administración de Redes. Tipos de ataques DDoS que he recibido – I. 13/07/2016 – 4:57 pm. Recuerdo aún cuando en el 2012. Ví el primer ataque DDoS de amplificación UDP. Aquel fue de DNS…. No fuimos objetivo del ataque sinó que se usó un dns nuestro como amplificador. Aunque en realidad dicho server no era un “ open resolver. 8220;, simplemente se nos usó como vector para amplificar peticiones mediante queries tipo “ANY”. Flow-state 53 udp flow-disable nat-enable. 8211; Los a...
dnsworkshop.de
DNS Workshop
http://www.dnsworkshop.de/roller/dnsworkshop
Friday Feb 28, 2014. Delve deep into DNSSEC. BIND 9.10 is the new version of the BIND 9 DNS server from ISC http:/ isc.org. Not to confuse with BIND 10, which is a different DNS server product). I will report in a series of articles about the new features in BIND 9.10. The first beta version of BIND 9.10 has been released this week and can be found at ftp:/ ftp.isc.org/isc/bind9/9.10.0b1/. BIND 9.10 contains a new command-line tool to test DNSSEC installations. The tool is called. By Carsten in Servers.
ibiohazardi.blogspot.com
BIOHAZARD SIDE: 04/29/13
http://ibiohazardi.blogspot.com/2013_04_29_archive.html
Lunes, 29 de abril de 2013. Cómo saber si tu DNS puede ser empleado para un ataque DDoS. Cómo saber si tu DNS puede ser empleado para un ataque DDoS. La semana pasada, Jesús Pérez nos dio precisos detalles de cómo se llevó a cabo el ataque a SpamHaus. Grosso modo podemos decir que el quid de la cuestión era una mala configuración de los servidores DNS, que permitían ser empleados para ataques de amplificación. Recientemente el US-CERT ha liberado una nota en la que describe este ataque. 2:15:00 p. m.