Tuesday, December 23, 2014

North Korea experiencing severe Internet outages

Severe Internet connectivity problems seen in North Korea in wake of Sony hacking attack



ricky l
0users liked this commentThumbs UpThumbs Down0users disliked this comment
ricky l • a second agoRemove
Hacking and bringing the Internet down with brute force is not a difficult thing.
(1) goggle search the web server hosted in the region.

(2) nslookup for the web server - to determine the URL and the ip address of the web server

(3) traceroute the web server using URL or ip address - to determine the hop-by-hop devices and interface to reach the web server

(4) establish the ip address and hostname of each devices - to identify the Internet router egress interface.

(5) DOS and DDOS the Internet router egress interface - and the Internet Router crash.
Reply

ricky l
0users liked this commentThumbs UpThumbs Down0users disliked this comment
ricky l • a second agoRemove
But please don't do it because if try the above - will definitely get caught - as your identity can be traced.
ricky l
0users liked this commentThumbs UpThumbs Down0users disliked this comment
ricky l • a second agoRemove
Of course you can hide your identity by using proxies if you are a sophisticated hackers such as using :-
(1) VPN IPsec
(2) NAT
(3) Web Proxy

But the owners of these 3 proxies can still trace you.

Unless you are good enough to do botnets. 
ricky l
0users liked this commentThumbs UpThumbs Down0users disliked this comment
ricky l • a second agoRemove
Eg. of NAT - you can set nat outside (public address) and nat inside (private address), nat pool (few range of private address - and you can choose one of this private address). Internet can only see the nat outside (public address) and the nat inside (private address) of nat pool is hidden from the internet.
Your identity is hidden - but the owner of NAT will be able to trace you.
ricky l
0users liked this commentThumbs UpThumbs Down0users disliked this comment
ricky l • a second agoRemove
Eg. of VPN IPsec - crypto isakmp, crypto IPsec of external public address and internal ip address, crypto map transform-set.

public address will access the internet, while private address is hidden and encrypted.

Your identity is hidden - but the owner of VPN IPsec can trace you.

ricky l
0users liked this commentThumbs UpThumbs Down0users disliked this comment
ricky l • a second agoRemove
Unless one is very good by developing botnets - and then propagate and infect botnets to unprotected devices such as servers, or other network devices - to launch attack.

This could be how GOP hack Sony.
Wailhi
0users liked this commentRate a Thumb UpRate a Thumb Down0users disliked this comment
Wailhi  •  11 hours ago Report Abuse
Is that you hacked other computers too? I'm just curious.


  • Alexander
    0users liked this commentRate a Thumb UpRate a Thumb Down0users disliked this comment
    Alexander  •  38 minutes ago Report Abuse
    The irony is that with all that knowledge about networks and Internet, you weren't able to put all that info in one single message ;)
  • ricky l
    0users liked this commentThumbs UpThumbs Down0users disliked this comment
    ricky l • a second agoRemove
    No I don't hacked networks.

    I defend networks. 

  • ricky l
    0users liked this commentThumbs UpThumbs Down0users disliked this comment
    ricky l • a second agoRemove
    The below report reveals that - proxies have been used to hide the identity and launch attacks behind the proxies.

    --------

    South Korea hacking suspect used China IP addresses: Investigators
    PUBLISHED ON DEC 24, 2014 6:49 PM

    SEOUL (AFP) - A suspect in the hacking attack on South Korean nuclear reactors has used multiple Internet protocol (IP) addresses based in China, investigators said Wednesday.

    The defence ministry's cyber warfare unit has increased its watch level against attacks after the publication last week of a variety of information about the South's nuclear power plant operator on Twitter.

    It included designs and manuals for two reactors, as well as personal information on some 10,000 workers at Korea Hydro and Nuclear Power (KHNP).

    The suspected hacker worked from the northeastern Chinese city of Shenyang, according to a joint investigation team of government and prosecution officials quoted by Yonhap news agency.

    William
    0users liked this commentThumbs UpThumbs Down0users disliked this comment
    William  •  2 minutes 16 seconds ago Report Abuse
    It is no easy feat to 'totally down' the internet access of a nation. Good job, US( ie. if it was done by the US)!

    However, I believe it was still too mild a response. The US should have developed a computer virus and sent it to N Korea, so that when Kim turned on his computer, a picture of 'Uncle Sam showing his middle finger to Kim' would appear, coupled with the message : Here's farking you, fatso!
    Reply

    • ricky l
      0users liked this commentThumbs UpThumbs Down0users disliked this comment
      ricky l • a second agoRemove
      It there are only 4 Internet backbone routers - then only need to DOS and DDOS 4 egress Internet router interface.

      Not too difficult.
    • ricky l
      0users liked this commentThumbs UpThumbs Down0users disliked this comment
      ricky l • a second agoRemove
      That means no need sophisticated hackers to do it.
      Some knowledge on network connectivity can do it - may not be a pro job. 
      Adrian
      0users liked this commentThumbs UpThumbs Down0users disliked this comment
      Adrian  •  2 minutes 33 seconds ago Report Abuse
      Not many North Koreans will be affected since most of North korea do not have internet access.
      Reply

      • ricky l


      • 0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Do they use smartphone?
        Smartphone access internet. 
        ricky l

      • 0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Do smartphone use GPS?
        GPS use satellite. 
        ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Do smartphone use GPS?
        GPS use satellite.
      • ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Do smartphone use wifi?
        Wifi use RF - 2.4Ghz, 5Ghz RF range.
      • ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Do smartphone use 2G, 3G, 4G?
        2G, 3G, 4G also use RF. 
      • Adrian
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        Adrian  •  14 seconds ago Report Abuse
        @ Ricky L That's the part I am not too clear at 1 point they say they have over 1 mill mobile phone users but then they say these mobile phones have no access to the world wide web and can only make domestic calls. Don't think they get affected by it but not sure about it.                                            
      • ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        They are using Intranet not Internet.
        But RF can be intercepted if one is determined enough from neighbours.

      • ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Bring down one base station or 1 access point through RF will mean Denial of service.
        ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Thus when one started a cyber war, it is easy to retaliate.

        At the end, no winners - both will be losers. 
        This cyber war - is like conventional war - no winners, both will be losers.
         
      • ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        So low-orbiting satellite - is a super-long-range signal.
        2G, 3G, 4G network - is a long-range RF signal.
        Wimax - is a medium-range RF signal.
        Wi-Fi - is a short-range RF signal.
        Bluetooth - is a super-short-range signal.

        Alt the above are "cables in the air" - and are susceptible to interception.
        So even Intranet networks - are also vulnerable to hacking, man-in-the-middle-attack - eg. rouge APs, rogue base-stations etc - with long-range antennae to pick up the signals etc........

        Thus a war - is always a "lose-lose" outcome - as there will be collateral damages on both sides. 
        ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Cyber-warfare is addictive - a tic-for-a-tac.

        As each sides score success in hacking - collateral damages from both sides will become higher and higher - day-to-day operations are disrupted - unless both sides decide to stop. 
         
      • Henry
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        Henry  •  7 minutes ago Report Abuse
        @Ricky L: What about the phonecall signal, can it be hacked too? For example, hacking the entire Singtel or RF ? until can't make phonecalls?

      • ricky l
        0users liked this commentThumbs UpThumbs Down0users disliked this comment
        ricky l • a second agoRemove
        Unless you are prepared to go to jail - you can try it. 

    No comments:

    Post a Comment