[LINK] ArsT: DDoS Openly for Hire

Roger Clarke Roger.Clarke at xamax.com.au
Mon May 20 12:59:39 AEST 2013


DDoS-for-hire service works with blessing of FBI, operator says
Dan Goodin
May 20 2013, 7:15am EST
Ars Technica
http://arstechnica.com/security/2013/05/ddos-for-hire-service-works-with-blessing-of-fbi-operator-says/

"My service is a legal testing service," Ragebooter.net boss insists.

A website that accepts payment in exchange for knocking other sites 
offline is perfectly legal, the proprietor of the DDoS-for-hire 
service says. Oh, it also contains a backdoor that's actively 
monitored by the FBI.

Ragebooter.net is one of several sites that openly accepts requests 
to flood sites with huge amounts of junk traffic, KrebsonSecurity 
reporter Brian Krebs said in a recent profile of the service. The 
site, which accepts payment by PayPal, uses so-called DNS reflection 
attacks to amplify the torrents of junk traffic. The technique 
requires the attacker to spoof the IP address of lookup requests and 
bounce them off open domain name system servers. This can generate 
data floods directed at a target that are 50 times bigger than the 
original request.

Krebs did some sleuthing and discovered the site was operated by 
Justin Poland of Memphis, Tennessee. The reporter eventually got an 
interview and found Poland was unapologetic.

"Since it is a public service on a public connection to other public 
servers this is not illegal," Poland was quoted as saying. He 
continued:
"Nor is spoofing the sender address [illegal]. If the root user of 
the server does not want that used they can simple disable recursive 
DNS. My service is a legal testing service. How individuals use it is 
at there [sic] own risk and responsibilitys [sic]. I do not advertise 
this service anywhere nor do I entice or encourage illegal usage of 
the product. How the user uses it is at their own risk. I provide 
logs to any legal law enforcement and keep logs for up to seven days."

Poland went on to say:  "I also work for the FBI on Tuesdays at 1 PM 
in Memphis. They allow me to continue this business and have full 
access. The FBI also use the site so that they can moniter [sic] the 
activitys [sic] of online users.. They even added a nice IP logger 
that logs the users' IP when they login."

An FBI spokesman would neither confirm nor deny the claim, but Krebs 
said security researchers have found the site bizarrely includes the 
ragebooter.net user name in the flood of data directed at the target 
websites. Even more intriguing, someone hacked the site in March and 
leaked the users table, spilling the usernames of e-mail addresses of 
people who used the service. The list could contain a fair amount of 
data, since Ragebooter.net appears to average more than 400 attacks 
per day.


PROMOTED COMMENTS
keltor wrote:
I could see them requiring extra warnings, but really whatelse could 
there be that's wrong with it. Mind you all the big penetration 
testing companies use these same techniques to test your websites 
when you hire them.

Response:  Wrong, the penetration testing and load testing services 
from legitimate companies requires you to prove the ownership of the 
domain or server you are testing. You can't just use them to test 
external third party servers which do you not have control.

Hell, even Google requires you to prove the ownership of a domain or 
website for some services. Doing this is extremely easy like adding 
an extra record in the DNS server, or confirming the email address on 
the whois or adding a code in the domain to be readed externally by 
the test server.

Any service which do not want users proving the ownership of the 
servers they test, is not legally complaint.

The excuse about not using recursive DNS is a lame excuse. How about 
"If you don´t want me breaking your house doors down, do not use wood 
doors..its your fault!!!!..!

There are tons of reasons why some need to have recursive DNS on, 
that is a stupid excuse. If the service is legally complaint, he 
should require users to check they are the admins of the systems they 
want to test.

GrieviantArs Praetorianet Subscriptor
Based on its name (RageBooter), it's probably safe to assume that 
this site was attempting to appeal to gamers who get pissed off when 
they start losing and want to boot their competitors offline. The 
rage boot goes almost as far back as the rage quit.

Let me explain. Unlike PC games which usually use a dedicated server 
for multi-player, the vast majority of Xbox live games typically pick 
one player in the game to act as the server. This person is referred 
to as the host and everyone else is a client. If you have a good 
connection and are centrally located, you might find that you 'pull 
host' quite often. Since all the game traffic goes through your xbox, 
you can identify the IP addresses of your competitors and teammates 
without much difficulty. There is a program called 'Cain and Abel' 
which is quite popular for this purpose. Actually, because there is 
an initial negotiation phase where Xbox live attempts to determine 
who should be host by testing latency and bandwidth between all 
players, you don't necessarily even need host to discover the IP 
addresses of everyone else in the game. While you might not know the 
specific IP address of every player, you could use a DDOS site like 
RageBooter to start hitting players until the desired target lags out 
of the game. Rather sadistically, the users of such services will 
sometimes let the DDOS continue for hours so as to hold the target 
offline.

If you've ever watched any Halo 3 on twitch over the past couple 
years, people getting booted offline is incredibly common. The 
booters will often even come into the twitch chat of the person 
streaming to taunt them. You might think that a community whose 
matchmaking population is almost completely dead would be happy just 
to have people still playing the game, but you'd be wrong.

-- 
Roger Clarke                                 http://www.rogerclarke.com/
			            
Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA
                    Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au                http://www.xamax.com.au/

Visiting Professor in the Faculty of Law               University of NSW
Visiting Professor in Computer Science    Australian National University



More information about the Link mailing list