(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)


1.16.2010 DD0S ABTS (Karnataka), CMSU-NET AMAZON-EC2-5 Research in motion Microsoft Centauri Comms Layer42.Net, Inc ViaWest ViaWest FR-METALLERIE-VILLEMIN PSINet, Inc. Silicon Valley Colocation, Inc. Road Runner HoldCo LLC Road Runner HoldCo LLC COMCAST Layer42.Net, Inc. Cricket Communications Inc Edgios Inc. Road Runner HoldCo LLC CABLE ONE Inc. Wave Broadband TELINEA BOSNIA SIL-UBIT SK-Gaming via Gameserver Asuk Creative Limited OVH SAS
1.17.2010 DD0S KORNET TOR node SHAWCABLE.NETE.NET BLUTMAGIE Olaf Selke Exploit Prevention Labs SCSNET-CATV-SEOKYUNG BORANET-1 Seoul Neucom Inc.

Pcaps have been parsed, there is much too much for a full disclosure, besides I don’t want to give out everything. Pcaps and forensics report have been passed to the authorities carrying out the investigation to add to the other data that they have gotten elsewhere.

The basics of the attack as of his last hit on me are these:

  • Using TOR nodes as well as perhaps a proxy, but most likely just tor sessions. If he were sneaky like though, he would be proxying to a box that then has poisoned TOR nodes at their disposal
  • Other compromised or complicit machines are also being used (admins will be being contacted by authorities) I am sure there are thousands of these botnet machines that the C&C can use. The irony is that trying to stamp out the compromised C&C boxes is kinda like trying to DoS all the Jihadi websites out there. For every one you take down, there are 5 more mirrors out there for content to be broadcast from
  • Much of the traffic was being sent from the EU focusing in the DE region, but there was also some Korea in there
  • 30 minutes at a time.. Either paying for increments of time to a botherd, or, the TOR nodes throttle out as this is something they do to try and prevent this type of misuse
  • He’s using a combination of syn/fin TCP callouts to flood the system with junk and hose the webserver.
  • In the last attack he was using what looked like canned scan scripts to flood the server with junk calls for different protocols/ports etc
  • He seems to have been using a C&C system that would call up a java script to check if the DDoS was in fact working. Now, if the script was working with the home IP address of the box initiating, then perhaps the GET’s like the FIOS address were actually his box looking for a file. Or maybe it was someone working with him… Or.. Them.
  • The FIOS address made a DIRECT call out to my webserver looking for a WMV file. That file has only been linked to my WordPress blog from some time back. This access coincided with the timing of the attack to be used as a method of seeing how the server was responding. By looking at the download bar one could tell just how horked the system was. As well, the download initiation would also engage much of the servers bandwith making the attack work even faster. Would he be that foolish to actually make this mistake? He is rather full of himself so, yeah, he seemed to think that I was some IT auditor without skills so maybe he just got lax. Maybe he is just a stupid kid with impulse issues…

Once the investigators do their thing, the nodes that they can reach will be closed. The TOR server admins will be told about the events, and if they are keeping any logging at all, they likely will help out. However, the TOR is really meant to not have any logging. Kinda like ANONINE the proxy he has been using.

Also while looking about I noticed that mypetjawa, seems to have redacted their post about j35t3r taking down Ahmadinejad’s site. Maybe its just an internal server error 500 as I see when I search their site directly, but its in their archive if you Google it. I am sure that DD0S-ing that site pretty much makes j35t3r no friends on either side of the political situation there.

… And me? My site? Still up.

Well, it’s no biggie if its down here and there. But, the opportunity to capture all the packet traffic, as well as get that .ru hotmail account from his direct correspondence is helping the boys do their thing. Of late though he has laid off with only the occasional twitter taunt to get me to respond.

Weak attempts at best.. And such bravado talking about how he has bested me. Well, it’s not really me he has to worry about. He will do himself and his pals in quite nicely on his own I think.

It’s mostly out of my hands now… Oh and deleting Twitters won’t be helping either.. Google cache is a wonderful thing.

Hope you look good in orange j35t3r, cuz I think that is the color that they will be giving you.



Written by Krypt3ia

2010/01/21 at 03:19

5 Responses

Subscribe to comments with RSS.

  1. Dammit Scot, what am I gonna do? You got me, and now you have passed on your fantastic sleuth-work on to the darling feds, I am surely totally screwed right?

    Well done Scot, you managed to (somehow) check your own log files, shit, that’s so clever of you. Why did I not think you might do that in advance?

    Oh, cease fire. I did. PS if your next tactic is about the time of day I am active, therefore you can determine my whereabouts, you are being made to look a fool on that count too. But I am sure you need a straw to grasp judging from your latest effort. you really need to stop trying to save your face, it makes you look massively silly. Also I am also in direct contact with Government depts. maybe even some you have never even heard of.

    They deem you and your jihad training material irrelevant (xxxx) and they regard me as even less of a priority, so why don’t you quit your sad little campaign, and quit follwing me round the press articles, you look so stupid. Especially when people come back here to see what the story is. But then I suppose thats what you want – hits. On a wordpress blog. get a life. Nobody cares about you or me.

    you do your stuff, and I will do mine. If you continue to try and exploit my name for your own blog traffic benefits, you will feel me. For now I am happy to let you make yourself look like a fool. You do it so well.

    So Scot, – I propose a truce, so I can get on with the task at hand, I am wasting far too much time replying to you, and you being the infosec guru that you are, I am sure your time would be spent far better not doing natty little jpgs of nodes, and examinig your logs, and googling for posts referencing me so you can have your say.

    You sir, are boring, and I am bored, this is the last time your blog gets any more airtime from me.

    You have nothing to say, and you say it too damn loud.

    Good morning to you.




    2010/01/21 at 23:14

  2. Magnanimous….


    2010/01/22 at 04:48

  3. Interesting Gambit you’re playing…

    Touched a bit of a nerve there huh? As I read your reply the psychological term “Transference” comes to mind. You see, I was not seeking any attention and you came to me. So, your whole contention that I am using you for word press traffic is ludicrous.

    Honestly, if I had absolutely no merit to any of my findings or arguments, then surely you could just ignore me correct? Instead, you come at me with threats that your “handlers” and you will take care of me if I don’t lay off with my clueless meanderings. So, your spastic response tells me a few things.

    First off, I get under your skin. Which, I rather enjoy. I have played you rather well here. You are easy to goad into response and obviously gotten a rise out of you. This usually is a symptom of poor impulse control. Your actions now tell me that either you have realized there is nothing more you can do, or, you in fact got a slap from your betters and were told to lay off. Either way, I win.

    Second, some or all of the things I have said have some merit if not are dead on.

    Third, IF, and that is a BIG IF you are indeed a condoned asset for a government/DoD entity, you are not a “covered” one. This means that you are on your own when you get burned. You may be the “Tip of the Spear” in some machination to create a “patriot hacker” movement, but, your actions bespeak a personality that will eventually make some large mistakes. When that happens, and you become a liability, then your masters will leave you high and dry.

    Fourth, if you are indeed not working for any GOV/MIL entity, then you just opened the door to pissing them off and looking for you just out of spite. So, keep on going the way you are and see.

    Lastly, much of my mind is leaning toward the idea that you are just full of shit. You speak of all these things to make you look important, but in the scheme of things you are very much the opposite and you know it. So you put out more and more energy to make yourself important.

    In the end, you will be a footnote, nothing more.


    2010/01/22 at 16:01

  4. […] my little incident with j35t3r I have been paying more attention again to the IDS. In the last few days alone the system has seen […]

  5. […] since they aren’t the ones who are likely going to run to the authorities. The ones that are talking are making their own assumptions and are mostly conjecture. So, it’s likely we won’t […]

Comments are closed.

%d bloggers like this: