Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Subscribe to our newsletter

Advertise on LowEndTalk.com

Latest LowEndBox Offers

    routing traffic through 34 servers located in nearly 20 countries
    New on LowEndTalk? Please read our 'Community Rules' by clicking on it in the right menu!

    routing traffic through 34 servers located in nearly 20 countries

    hyperblasthyperblast Member
    edited February 11 in General

    sirs,

    "The government says the men disguised their hacking activity by routing attack traffic through 34 servers located in nearly 20 countries, using encrypted communications channels within Equifax’s network to [...]"
    (https://krebsonsecurity.com/2020/02/u-s-charges-4-chinese-military-officers-in-2017-equifax-hack/)

    how can somebody route traffic through 34 servers?

    Thanked by 1greattomeetyou

    Comments

    • Are you asking how to disguise your hacking cause latency otherwise will kill you.

      Find a "underground" forum and ask the question there.

      Don't be so serious. It's just a forum. No one cares what you think anyway.

    • no my question does not refer to hacking activities on my part! i am rather interested in how this works technically and want to understand it.

    • BlaZeBlaZe Member, Provider

      @hyperblast said:
      no my question does not refer to hacking activities on my part! i am rather interested in how this works technically and want to understand it.

      That's what they all say :p

      "It's for educational purpose only"

      Thanked by 1ViridWeb

      ExoticVM.com - Find VPS in exotic locations! - Discussion Thread

    • edu.cn? ;)

    • marvelmarvel Member without signature

      It's not so hard, Tor does the same thing right?

    • @BlaZe said:

      @hyperblast said:
      no my question does not refer to hacking activities on my part! i am rather interested in how this works technically and want to understand it.

      That's what they all say :p

      "It's for educational purpose only"

      I thought the saying is "it's for research purposes" or is that only applicable to certain clips of videos?

      Don't be so serious. It's just a forum. No one cares what you think anyway.

    • @somik said:

      @BlaZe said:

      @hyperblast said:
      no my question does not refer to hacking activities on my part! i am rather interested in how this works technically and want to understand it.

      That's what they all say :p

      "It's for educational purpose only"

      I thought the saying is "it's for research purposes" or is that only applicable to certain clips of videos?

      Clips? Aren't you the fastest hand in the west.

      Thanked by 1somik
    • @hyperblast said:
      sirs,

      "The government says the men disguised their hacking activity by routing attack traffic through 34 servers located in nearly 20 countries, using encrypted communications channels within Equifax’s network to [...]"
      (https://krebsonsecurity.com/2020/02/u-s-charges-4-chinese-military-officers-in-2017-equifax-hack/)

      how can somebody route traffic through 34 servers?

      Well, if you can route through one server, you can run through more. But they don't mean 34 relays each time, just up to 34 when taking all servers into account. 2-5 relays I would get realistic.

      The more interesting question is how this gets detected. From what we know from Snowden leaks, traffic is mirrored on major connections and they can register callbacks so that if a source/destination address passes through the connection they can see to/from the traffic came. "Follow the money IPs"

    • SplitIceSplitIce Member, Provider

      I'm guessing slot of European countries, otherwise TCP connections would probably just timeout lol.

      X4B - DDoS Protection: Affordable Anycast DDoS protection including Layer 7 mitigation with PoPs in the US, EU and Asia.
      Latest Offer: Black Friday 2019 Offer
    • rcxbrcxb Member

      Basically, you just chain SOCKS proxies. Make a proxy request to the first one, then it forwards the data, which is a SOCKS request to another, then it sends on the data, which is a SOCKS request to another proxy, and so on. Turtles all the way down.

      Tor does three levels of proxy chaining.

    • @rcxb said:
      Basically, you just chain SOCKS proxies. Make a proxy request to the first one, then it forwards the data, which is a SOCKS request to another, then it sends on the data, which is a SOCKS request to another proxy, and so on. Turtles all the way down.

      Tor does three levels of proxy chaining.

      Because of MTU and overhead, does that mean there's going to be one full size packet and one fragment for each packet?

    Sign In or Register to comment.