Hackers Amplified DNSAdded: Monday, March 19th, 2012
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
Anonymous hacker group is known worldwide for taking down a number of important sites, including FBI, Interpol, Panda Security, and the US Department of Justice. Now they move further and are going after the Web’s entire Domain Name System.
Of course, bringing the whole DNS down isn’t a very easy task. Anonymous is now planning on using the DNS itself as a weapon, and is developing a next-generation instrument named DNS amplification to reach this goal. The so-called “gadget” is expected to hack into an integral part of the web’s global address book, sending enormous data packets to the affected machines without revealing the source of attack. The suggested scheme becomes possible thanks to vulnerability in the DNS system, which actually exists for a decade already.
If you take a look from the inside, you would see that the DNS system is working on a strict hierarchy. At its top there are “root” nameservers. You can accomplish DNS lookup just by obtaining access to various levels of the hierarchy. Meanwhile, there’re 2 methods a DNS resolver is working: the first is iterative mode, and the second is recursive mode. In the first mode, the resolver first queries the root nameservers for the top-level domain’s nameservers, and after this it queries the top-level domain’s nameserver for the 2nd level, and so on. When contacting the various nameservers, the resolver will either find an answer or give up because of lack of it.
In the second case (the recursive mode), the resolver’s task becomes easier – it will be asking for one DNS server for the whole name, after which the server will do all the necessary requests for it.
There are numerous benefits of DNS amplification. For instance, the source of the attack could be hidden with UDP via forged headers. In addition, different VPNs could also be used as extra-precaution, because Tor’s services don’t function on UDP traffic. Therefore, due to the fact that DNS amplification relies on UDP (a connection-free protocol), the sent packets can’t be easily circumvented.
The industry experts seem worried. They point out that if Anonymous do manage to pull this stunt, there won’t be much that they can’t do in retaliation to the ongoing anti-piracy cyberwar, started by the US authorities.
March 19th,2012Posted by:
Monday, March 19th, 2012
|posted by (2012-03-19 20:01:03)|
|i trhought all these had been busted??? snitched by ther hed man? eitherway seems way complex let em hav at it stik it to "the man"|
|posted by (2012-03-19 20:51:29)|
|well see if you start a fire you better be in control of the fire !! go for it boys|
|do you think only 60 people in this world have the skill level to pull off these hacks? no, there is 100's of thousands...|
Im not even saying what we see here IS anonymous or even if the FBI really got them. All im saying, one way or another, This isnt a Typical war. This is a Cyberwar, the only winner is the last man standing, not the country who admits defeat.
|let the fight for internet freedom begin as the goverments are rolling over to the bulls**t of the music/film industry demands.|
the internet was started to share files freeley in the first palce and now its been taken over by the greed of a few.
phew rant over...
great read as allways SaM
|posted by (2012-03-22 15:24:04)|
|its because there are FED UP. cant say I blame them, the RICH need to be put in there place! give them every dime in the world and they will want more! the rich doesn't just consist of government. there are all kinds of rich groups. and yes even religion is involved.|
I see the same thing in the real world happening just like in the movie hackers "hackers of the world unite" and yes a lot of whats in that movie is made up.
and if there are as many as kingtiger claims it is possible to take every thing down.
Most Popular Stories