North Korea experiencing severe Internet outages
Severe Internet connectivity problems seen in North Korea in wake of Sony hacking attack
By | Associated Press – 9 hours ago
ricky l • Remove
Hacking and bringing the Internet down with brute force is not a difficult thing.Reply
(1) goggle search the web server hosted in the region.
(2) nslookup for the web server - to determine the URL and the ip address of the web server
(3) traceroute the web server using URL or ip address - to determine the hop-by-hop devices and interface to reach the web server
(4) establish the ip address and hostname of each devices - to identify the Internet router egress interface.
(5) DOS and DDOS the Internet router egress interface - and the Internet Router crash.
ricky l • Remove
But please don't do it because if try the above - will definitely get caught - as your identity can be traced.
ricky l • Remove
Of course you can hide your identity by using proxies if you are a sophisticated hackers such as using :-
(1) VPN IPsec
(2) NAT
(3) Web Proxy
But the owners of these 3 proxies can still trace you.
Unless you are good enough to do botnets.
ricky l • Remove
Eg. of NAT - you can set nat outside (public address) and nat inside (private address), nat pool (few range of private address - and you can choose one of this private address). Internet can only see the nat outside (public address) and the nat inside (private address) of nat pool is hidden from the internet.
Your identity is hidden - but the owner of NAT will be able to trace you.
ricky l • Remove
Eg. of VPN IPsec - crypto isakmp, crypto IPsec of external public address and internal ip address, crypto map transform-set.
public address will access the internet, while private address is hidden and encrypted.
Your identity is hidden - but the owner of VPN IPsec can trace you.
Alexander • Report Abuse
The irony is that with all that knowledge about networks and Internet, you weren't able to put all that info in one single message ;)
ricky l • Remove
The below report reveals that - proxies have been used to hide the identity and launch attacks behind the proxies.
--------
South Korea hacking suspect used China IP addresses: Investigators
PUBLISHED ON DEC 24, 2014 6:49 PM
SEOUL (AFP) - A suspect in the hacking attack on South Korean nuclear reactors has used multiple Internet protocol (IP) addresses based in China, investigators said Wednesday.
The defence ministry's cyber warfare unit has increased its watch level against attacks after the publication last week of a variety of information about the South's nuclear power plant operator on Twitter.
It included designs and manuals for two reactors, as well as personal information on some 10,000 workers at Korea Hydro and Nuclear Power (KHNP).
The suspected hacker worked from the northeastern Chinese city of Shenyang, according to a joint investigation team of government and prosecution officials quoted by Yonhap news agency.
William • Report Abuse
It is no easy feat to 'totally down' the internet access of a nation. Good job, US( ie. if it was done by the US)!Reply
However, I believe it was still too mild a response. The US should have developed a computer virus and sent it to N Korea, so that when Kim turned on his computer, a picture of 'Uncle Sam showing his middle finger to Kim' would appear, coupled with the message : Here's farking you, fatso!
- ricky l • Remove
That means no need sophisticated hackers to do it.
Some knowledge on network connectivity can do it - may not be a pro job.
Adrian • Report Abuse
Not many North Koreans will be affected since most of North korea do not have internet access.
Reply
-
ricky l • Remove
Do they use smartphone?
Smartphone access internet. -
ricky l • Remove
Do smartphone use GPS?
GPS use satellite.
Adrian • Report Abuse
@ Ricky L That's the part I am not too clear at 1 point they say they have over 1 mill mobile phone users but then they say these mobile phones have no access to the world wide web and can only make domestic calls. Don't think they get affected by it but not sure about it.
ricky l • Remove
Bring down one base station or 1 access point through RF will mean Denial of service.
-
ricky l • Remove
- ricky l • Remove
So low-orbiting satellite - is a super-long-range signal.
2G, 3G, 4G network - is a long-range RF signal.
Wimax - is a medium-range RF signal.
Wi-Fi - is a short-range RF signal.
Bluetooth - is a super-short-range signal.
Alt the above are "cables in the air" - and are susceptible to interception.
So even Intranet networks - are also vulnerable to hacking, man-in-the-middle-attack - eg. rouge APs, rogue base-stations etc - with long-range antennae to pick up the signals etc........
Thus a war - is always a "lose-lose" outcome - as there will be collateral damages on both sides.
Henry • Report Abuse@Ricky L: What about the phonecall signal, can it be hacked too? For example, hacking the entire Singtel or RF ? until can't make phonecalls?
No comments:
Post a Comment