Someone is trying to take down the Drudge Report -- and it's a mystery who's behind it | |
Anonymous Coward User ID: 45306447 United States 01/09/2017 05:59 AM Report Abusive Post Report Copyright Violation | A dox is such a primitive method. And is so easily achieved by most anyone with remedial hacking knowledge. Shit you can even buy the warez and a script to run it if youre a noob. Doesnt even damage the target site. Just eats bandwidth for the duration of the attack. Even the largest of ddos these days is easily achievable with the right malware distributed properly to take over the zombie machines. Doest seem like anything a state actor would employ. |
Anonymous Coward User ID: 73750164 United Kingdom 01/09/2017 06:13 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73750164 United Kingdom 01/09/2017 06:23 AM Report Abusive Post Report Copyright Violation | A dox is such a primitive method. And is so easily achieved by most anyone with remedial hacking knowledge. Shit you can even buy the warez and a script to run it if youre a noob. Quoting: Anonymous Coward 45306447 Doesnt even damage the target site. Just eats bandwidth for the duration of the attack. Even the largest of ddos these days is easily achievable with the right malware distributed properly to take over the zombie machines. Doest seem like anything a state actor would employ. your logic is, because it's easily done a state wouldn't be doing it? HAHAHAHA that's some illogical shit right there. |
Anonymous Coward User ID: 69520875 Russia 01/09/2017 06:27 AM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 1172398 United States 01/09/2017 06:27 AM Report Abusive Post Report Copyright Violation | |
Dr. Moran
User ID: 73391481 Finland 01/09/2017 06:42 AM Report Abusive Post Report Copyright Violation | A dox is such a primitive method. And is so easily achieved by most anyone with remedial hacking knowledge. Shit you can even buy the warez and a script to run it if youre a noob. Quoting: Anonymous Coward 45306447 Doesnt even damage the target site. Just eats bandwidth for the duration of the attack. Even the largest of ddos these days is easily achievable with the right malware distributed properly to take over the zombie machines. Doest seem like anything a state actor would employ. your logic is, because it's easily done a state wouldn't be doing it? HAHAHAHA that's some illogical shit right there. There was similar kind of bad reasoning in the DNC/elections hack discussion earlier. Traces had been found of a relatively old hack tool, and the GLP conclusion was that it showed that it couldn't have been a nation state -level actor. They would have use some more fancy software, right? Wrong. If you're a state-level actor, you wouldn't want to advertise your involvement by using your latest software. If the old tool does the trick, why not use it to give you more deniability ("Come on. It's widely available and anyone could have used it!")? Now, I'm not taking a stance on who did the hacking. Just using it as an example of flawed reasoning. Last Edited by Dr. Moran on 01/09/2017 06:42 AM Steaks are high Tomato plants are in Family is shaved It has begined |
Pinkorchid- Enemy @The Gates
(OP) User ID: 73712951 Australia 01/09/2017 06:46 AM Report Abusive Post Report Copyright Violation | A dox is such a primitive method. And is so easily achieved by most anyone with remedial hacking knowledge. Shit you can even buy the warez and a script to run it if youre a noob. Quoting: Anonymous Coward 45306447 Doesnt even damage the target site. Just eats bandwidth for the duration of the attack. Even the largest of ddos these days is easily achievable with the right malware distributed properly to take over the zombie machines. Doest seem like anything a state actor would employ. your logic is, because it's easily done a state wouldn't be doing it? HAHAHAHA that's some illogical shit right there. There was similar kind of bad reasoning in the DNC/elections hack discussion earlier. Traces had been found of a relatively old hack tool, and the GLP conclusion was that it showed that it couldn't have been a nation state -level actor. They would have use some more fancy software, right? Wrong. If you're a state-level actor, you wouldn't want to advertise your involvement by using your latest software. If the old tool does the trick, why not use it to give you more deniability ("Come on. It's widely available and anyone could have used it!")? Now, I'm not taking a stance on who did the hacking. Just using it as an example of flawed reasoning. If there are holes in the thought process , well it's our duty to poke them. Warning proceeding to read this may cause anxiety, poster is indemnified if you proceed. I can't give you the ultimate truth ,it's all a matter of perspective and spin. So I empower you with the gift of discernment. SEE THE TRUTH , KNOW THE TRUTH, FEEL THE TRUTH |
Anonymous Coward User ID: 73754662 United Kingdom 01/09/2017 02:03 PM Report Abusive Post Report Copyright Violation | |
Anonymous Coward User ID: 73080113 Canada 01/09/2017 02:05 PM Report Abusive Post Report Copyright Violation | |