Computer, Hack, Hacking, Internet, Technology

Self Hack Report 101

========== Self-Hack Attempt 101 Report =========
So I have two laptops at home, both connected to the same WiFi which I am an admin of.
Today I was trying to simulate a hack on one of the machines, let’s call it A using the second one, B. Both machines are running Linux, but that shouldn’t matter.
Laptop-A was supposed to run a script that performs a hack attack on B using what we call ‘Ping Of Death DoS Attack’. Basically, laptop A launched 20 parallel threads each sending 500 Service-Me requests on laptop B, each millisecond for 30 seconds. That’s a total of 300,000,000 (300 million) requests in just 30 seconds.
To cut the story short, I overlooked the mechanisms that I used, I actually ended up bricking my WiFi LTE router, which I had to hard-reset and I also froze laptop A, the attacker.
Basically, the attack bounced back and attacked the attacking computer, not the target, because each GET-request waited for a response, and they all piled up in a waiting queue, and eventually filled up the RAM, killing my computer (8 Gig RAM, Octa core processing units, intel i7). I had to reboot it.
The target computer did not get affected in the process simply because those thousands of requests could not get served passed the WiFi router. So in essence, if the target laptop, B, was a global web server, it would have not crushed, but just inaccessible. So in other words, I can say that the attack succeeded in terms of DoS definition.
================= End of Report 101 =============
Advertisements
Computer, Internet, Technology

Dark Internet vs Deep Web

Have you heard of “Dark Web” also known as “Deep Web” and another one called “Dark Internet”, also known as “Dark address” or “dark address space”?

These two are parts of the World Wide Web – the Internet. The first, Dark Web or Deep Web, is part of the network which is not publicly accessible or searchable. It is the ‘hard-to-find’ websites. This includes sites that need a special software or configurations to access – like most peer2peer file-sharing networks. Usually contain harmful or illegal distribution of files. Like Torrents ftps and tunnels. This also refers to websites that are accessible on the Internet, yet they are not indexed by standard search engines.

The latter, Dark Internet, can be confused with the former. The difference is very little. It is part of the Internet that is kept secret yet contain safe content. It is usually kept secret because people do not need to search for such data and not relevant for the public. For example, I could host an application or website on my personal computer, where I share information only relevant for my job with my colleagues – that means I’ll have to give them my IP address, which may not be the same every time, and give them some login credentials.

Really, feel free to confuse the two! They are just similar, really! But not so similar in the exam room. Lol

Ok! That’s enough for the day!