Flutterby™! : NTP amplication attack

Next unread comment / Catchup all unread comments User Account Info | Logout | XML/Pilot/etc versions | Long version (with comments) | Weblog archives | Site Map | | Browse Topics

NTP amplication attack

2014-03-05 02:29:46.051129+01 by Dan Lyke 0 comments

Technical Details Behind a 400Gbps NTP Amplification DDoS Attack.

The worst part is that because of buggy DSL modems (not namin' any names, but...), unless you were on the phone with your ISP trying to figure out why your connection was saturated, probably trying to figure out why you couldn't download anything because your local network couldn't get any requests out, you'd have no idea that your hardware was participating in such a thing.

[ related topics: Weblogs broadband ]

comments in ascending chronological order (reverse):

Comment policy

We will not edit your comments. However, we may delete your comments, or cause them to be hidden behind another link, if we feel they detract from the conversation. Commercial plugs are fine, if they are relevant to the conversation, and if you don't try to pretend to be a consumer. Annoying endorsements will be deleted if you're lucky, if you're not a whole bunch of people smarter and more articulate than you will ridicule you, and we will leave such ridicule in place.


Flutterby™ is a trademark claimed by

Dan Lyke
for the web publications at www.flutterby.com and www.flutterby.net.