this post was submitted on 25 Jul 2024
162 points (100.0% liked)

Cybersecurity

5777 readers
90 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Notable mention to [email protected]

founded 2 years ago
MODERATORS
top 8 comments
sorted by: hot top controversial new old
[–] [email protected] 19 points 4 months ago (4 children)

Is it a crime to voluntarily join a DDoS attack? I remember 4chan using such a tool (ion canon or something?). Maybe that would be a way to contribute to the war?

Anti Commercial-AI license

[–] [email protected] 24 points 4 months ago (1 children)

ion canon or something

LOIC: Low Orbit Ion Cannon

It was distributed covertly with the kitten meme, "It's dangerous to go alone..."

Is it a crime to voluntarily join a DDoS attack?

Don't fuck with the Russians, Morty.

[–] Jakeroxs 6 points 4 months ago (1 children)
[–] [email protected] 4 points 4 months ago* (last edited 4 months ago)

For the lulz.

[–] kid 10 points 4 months ago

Depends of the country. Disrupt with Internet/communications may be a crime in some countries.

[–] [email protected] 3 points 4 months ago
[–] deranger 3 points 4 months ago (1 children)

I’d imagine it is, but could someone prove you weren’t compromised?

[–] [email protected] 3 points 4 months ago* (last edited 4 months ago)

If it got to the point you were being investigated/prosecuted and you used a computer you didn’t properly dispose of afterwards, yes. They’ll take a forensic image of the system and trawl through it to find any artifacts left by your participation.

If you went and downloaded LOIC manually, you probably didn’t get compromised.

If a suss encoded powershell command loads and executes some dll in memory from the internet, which then runs some dechained process that’s sending the ddos traffic you probably got compromised.

Just like anything, you could make your intentional participation look like a compromise. You could also just buy a laptop with cash on fb marketplace, go to McDonald’s or Starbucks or some shit, get on their public WiFi, then just stash the laptop under a booth or something.

Side note, does anyone know if anyone wound up getting prosecuted for their participation in LOIC campaigns?