Forensic Analysis of the GRC DDoS Attack
Source: GRC.com - Posted by Dave Wreski   
Intrusion Detection Steve Gibson recounts the steps he took to stop his attack from being subjected to a distributed denial of service attack. "I believe you will be as fascinated and concerned as I am by the findings of my post-attack forensic analysis, and the results of my subsequent infiltration into the networks and technologies being used by some of the Internet's most active hackers.". . . Steve Gibson recounts the steps he took to stop his attack from being subjected to a distributed denial of service attack. "I believe you will be as fascinated and concerned as I am by the findings of my post-attack forensic analysis, and the results of my subsequent infiltration into the networks and technologies being used by some of the Internet's most active hackers."

He also talks about the apparent broken TCP/IP implementation in new versions of Windows. "t is impossible for an application running under any version of Windows 3.x/95/98/ME or NT to "spoof" its source IP or generate malicious TCP packets such as SYN or ACK floods. This has horribly changed for the worse with the release of Windows 2000 and the pending release of Windows XP."

Read this full article at GRC.com

Only registered users can write comments.
Please login or register.

Powered by AkoComment!