The Attack That Could Disrupt The Whole Internet - Computerphile

Поделиться
HTML-код
  • Опубликовано: 2 янв 2025

Комментарии •

  • @JH1010IsAwesome
    @JH1010IsAwesome 10 лет назад +3399

    I once tried a denial of service attack on my friend. I knew he has a 32 bit computer, so I tried to send him a Facebook message 2^32 characters long thinking that it would crash his computer (and possibly lead to a blue screen of death). My computer crashed before I could send the message.

  • @ericsarason9099
    @ericsarason9099 8 лет назад +3749

    Somebody should make a video. 3 guys are sitting in a room.
    Guy 1 puts on a mask that looks like guy 3
    Guy 1 whispers "Monlist" to guy 2
    Guy 2 throws a huge stack of paper at guy 3

  • @razielhamalakh9813
    @razielhamalakh9813 10 лет назад +6287

    I was gonna tell you guys a joke about UDP, but you might not get it.

  • @Lttlemoi
    @Lttlemoi 10 лет назад +485

    This reminds me of a project we had to do for University.
    We had to build a database driven web application. However, in order to fill our database, we were required to get our data from websites. In the end, it turned out that at least 5 groups were mass scraping the same website during a few weekends. Even though we never meant it to be a DOS attack, the poor server was in trouble.

  • @spazmaster6731
    @spazmaster6731 4 года назад +294

    A funny story from fall semester during the 2020 pandemic: because my university's classes were all online, one of my professors set up a website on a server he physically owned in his basement that he would upload assignments on. Turns out that was a bad idea because after every class when he would give us this week's assignment, he would get kicked offline from every student downloading from his server at the same time.

  • @SafetyLucas
    @SafetyLucas 10 лет назад +3577

    And I though I was scary pulling a flash drive out without safely ejecting it.........

  • @GtaRockt
    @GtaRockt 9 лет назад +1888

    Tom Scott is to computerphile what James Grime is to numberphile

  • @mvl71
    @mvl71 8 лет назад +694

    "Monlist!". The force of his disgust towards this command cracked me up no end! You just got yourself a new subscriber. Well done!

  • @BlackhartFilms
    @BlackhartFilms 10 лет назад +677

    Tom Scott is by far my favorite person they interview on Computerphile

    • @5nefarious
      @5nefarious 10 лет назад +80

      Yeah. It's especially funny how worked up and passionate he gets about some things.

  • @greenstonegecko
    @greenstonegecko 4 года назад +311

    "What time is it?"
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*
    Server: *You want to know the time?*

  • @Koseiku
    @Koseiku 9 лет назад +1299

    haha i love this guy. he is always so energetic.

    • @tomlloyd2603
      @tomlloyd2603 9 лет назад +210

      Koseiku he has his own youtube channel - Tom Scott
      He's brilliant :D

    • @eagle56786
      @eagle56786 9 лет назад +37

      Tom Lloyd Ha. I thought he looked familiar.

  • @bluekissedgalaxies
    @bluekissedgalaxies 8 лет назад +246

    i love how into it tom gets with the drawings

  • @Buzzy913
    @Buzzy913 9 лет назад +1154

    Why don't we just remove Monlist?

  • @Br3ttM
    @Br3ttM 2 года назад +46

    That "monlist" command sounds like something that exists for debugging, and should require special permission to use. Even without the DoS attack part, it seems like a massive privacy/security violation to just let anyone anywhere ask for a list of everyone who has accessed something. My guess is that if it wasn't just an accident that it was left in, they left it in because removing it would break something. "We can't fix it because something else needs it to stay exactly the same" is a thing in programming.

  • @Envinyon
    @Envinyon 10 лет назад +93

    I love this guy. He always sounds so excited when he's talking.

    • @n6i9k4a
      @n6i9k4a 10 лет назад +16

      His passion is addicting.

    • @stephenrowley4171
      @stephenrowley4171 10 лет назад +21

      n6i9k4a He has the rare talent that he's passionate about a subject but also has the ability to communicate that passion to the layman.

  • @bluephreakr
    @bluephreakr 10 лет назад +325

    I love how angry Tom gets over this subject. The _passion!_

  • @Trirosmos
    @Trirosmos 9 лет назад +234

    All of Computerphile's videos are cool and all, but....
    Tom is just amazing!

  • @Max-bh8tg
    @Max-bh8tg 8 лет назад +37

    More of tom please, his enthusiasm keeps you glued to the screen.

  • @cebsaid2932
    @cebsaid2932 4 года назад +70

    I like to imagine someone setting this up but forgetting to spoof the return and destroying themselves

  • @siloPIRATE
    @siloPIRATE 8 лет назад +222

    7:06 what do the other people in the building you're in think when they see you randomly scribbling and shouting 206 times? 😂

  • @newgoredan303
    @newgoredan303 8 лет назад +72

    The fax paper to computerphile is like the brown paper to numberphile. Same for Tom Scott and James Grime

  • @thisisnootnoots
    @thisisnootnoots 5 лет назад +75

    "I approve this stream being sent to me"

  • @345derder
    @345derder 10 лет назад +8

    I swear this guy
    I could just listen to him all day

  • @jaronfeld123
    @jaronfeld123 9 лет назад +3

    I just found a new favorite channel. This guy loves what he does.

  • @TheDoubleBee
    @TheDoubleBee 10 лет назад +2

    Two things I'd like to point out:
    1. You can spoof the IPv4/IPv6 address for any IP-based protocol (TCP, ICMP, IGMP, etc.), not just UDP.
    2. It's the ISP's job to drop packets that have a spoofed source address as they know exactly where the packet came from (based on MAC address), and even the big routing services have some level of detecting whether or not a source address is spoofed.

  • @Quasihamster
    @Quasihamster 10 лет назад +292

    amplified distributed DoS? Yep, I get it. When you try to kick the internet's butt, be sure to wear ADIDoS!

  • @PelegTsadok
    @PelegTsadok 10 лет назад +125

    This guy makes me feel bad for a computer...

  • @vinkuu
    @vinkuu 10 лет назад +1

    I've been a programmer of web apps for the last 15 years, and I like to consider myself more security-aware than the common developer, but this was actually new information for me. Thank you for sharing the knowledge.

  • @Bluelemonzz
    @Bluelemonzz 10 лет назад +2

    Thanks for explaining the difference between TCP and UDT. I didn't know it was that simple. Now I know why the setting on my surveillance system is the way it is

  • @MrVicke03
    @MrVicke03 8 лет назад +72

    I think that just happended...

  • @jochemvanl
    @jochemvanl 10 лет назад +15

    Very very good explanation!
    I work for a company with a reasonable sized network (couple of gbits) and own datacenter. For a while now we get multiple abuse reports a day for exactly this type of attack. Sending in these abuse reports is actually useful, as we will block customers after receiving too many reports and not seeing any action on their part.

    • @Chrispmiller84
      @Chrispmiller84 10 лет назад

      It sounds like you work for a server/VPS provider. If that's the case, you should look into some automated network monitoring software. Depending on your infrastructure there's most likely free ways of doing so, and if you're company's a decent size, it could afford the cost of some of the better solutions. In the long run, you'd save money from having to manually deal with those situations. And who knows... Maybe management would be appreciative of your recommendation. Might get a nice bonus/raise? :)

    • @jochemvanl
      @jochemvanl 10 лет назад +2

      Chris Miller thanks for the suggestion. I might just look into that.

    • @tech-kyle
      @tech-kyle 10 лет назад +1

      An an employee of a local ISP, we've been seeing these NTP attacks on a high-bandwidth customer of ours for some time now. We definitely notice. I believe we've simply blocked NTP from outside sources and are only allowing a select few popular ones, but that's slightly above me.

  • @thesickandwounded
    @thesickandwounded 10 лет назад +8

    love when this guy explains!

  • @Catnugget76
    @Catnugget76 10 лет назад +10

    More videos with this guy please. He explains everything so well

  • @davidsweeney111
    @davidsweeney111 10 лет назад +1

    I have to say I lean more to the chemistry side of the Brady universe, but I have to say I am completely riveted to watching this guy, he is so enthusiastic about his subject and so interesting to listen too, more please!

  • @NourSelim0
    @NourSelim0 10 лет назад +16

    Tom Scott is back on Computerphile! YAY! :)

  • @louisburke8927
    @louisburke8927 10 лет назад

    All the experts are so well spoken.

  • @lloydnone
    @lloydnone 10 лет назад +7

    And that is something you might not have known!
    Great Video! Thank you very much!

  • @Lolloz89
    @Lolloz89 10 лет назад +10

    Actually you can do a couple of things:
    1) Replication
    2) Distributed Caching
    3) Content Delivery Networks (a.g. Akamai)
    Theese are all expensive things, but if you are under a DDoS attack, you probably have enough money to pay for these services :)

  • @legendofFranktheTank
    @legendofFranktheTank 7 лет назад +2

    ive watched so much computer file, tom scott, matt and tom, and ashens, that youtube seems to genuinely think im british, and is now showing me ads for companies that dont exist in america

  • @stalingra11
    @stalingra11 10 лет назад +2

    @DerpTrolling on twitter currently holds the world record for the biggest DoS attack ever, it maxed out at over 420Gb/s and was against a company who wanted to test their infrastructure...They also delayed the customization packs for CoD by knocking the DNS servers that send the files, as wekk as every single LoL server, which is why they have had so much down time recently...

  • @caradu9973
    @caradu9973 9 лет назад

    He is an excellent orator and teacher!There is a lot I don't understand until explained the right way... I'm sure a lot of people feel that way. Thank You!

  • @MZZenyl
    @MZZenyl 10 лет назад +60

    Really good video. I love Tom, he's so enthusiastic! :) Also, he talks about topics that I find very interesting (not that I'd actually follow any of his "tips", I just find it interesting). :)

  • @gadgetpilipinas
    @gadgetpilipinas 10 лет назад +1

    Thanks a lot for this, Haley Joel Osment! Seriously, this is highly informative and worth sharing.

  • @UnknowinglyDerpy
    @UnknowinglyDerpy 6 лет назад +7

    Meanwhile in captions: [SCRIBBLES FURIOUSLY]

  • @Edgewalker001
    @Edgewalker001 9 лет назад +4

    I actually remember that back during my school days there was this script you could run called a flooder that did pretty much this, and if you picked the right port to send traffic to on those old windows computers they not only lost all internet connections but also instantly crashed to bluescreen. I remember having a lot of fun with THAT on my school's intranet... =p

  • @SpringgyHD
    @SpringgyHD 10 лет назад +258

    My IP is 192.168.1.1. a lot of people say they have the same IP but i thought IP's were only for one router/household. help?

  • @HampshireBrony
    @HampshireBrony 10 лет назад +3

    When you started talking about TCP vs UDP, I was thinking of a new name for the reflected DoS via SYN flood.
    That NTP thing is pure evil! Sounds like a command that was put in to an early ntpd for remote testing/diagnostic/logging and ended up staying in

  • @vipermagi5499
    @vipermagi5499 10 лет назад +5

    I love this video because the only way I know of to truly raise security in this very attacker centric world is to raise the base knowledge of the average user.

  • @ahmedabdelmalik-3050
    @ahmedabdelmalik-3050 3 года назад +4

    knowledge is priceless

  • @GypsyBackwards
    @GypsyBackwards 10 лет назад

    computerphile needs to have tom Scott on more, his videos are great!

  • @Ledon177
    @Ledon177 10 лет назад

    This guy really has a natural talent for teaching. I had never been interested in computer science until I started watching his videos.

  • @kapin0s
    @kapin0s 10 лет назад +1

    Thanks Tom! Another great video with a really interesting and also terrifying topic.

  • @THEGREATONE420
    @THEGREATONE420 9 лет назад +1

    so many different attack vectors exist in the tcp/ip stack. we are sitting here talking about host to host but the real fun begins when you start attacking the routers and routing protocols.. not that I'm in to that but the potential is huge.

  • @IanM0rris
    @IanM0rris 10 лет назад

    How did I not know about this beautiful channel?!?!

  • @aaronhsyong2
    @aaronhsyong2 5 лет назад +1

    Turned Closed Captions on. Saw [furiously scribbling] at 7:03. Nice

  • @Orxenhorf
    @Orxenhorf 10 лет назад +2

    Where the pressure really need to get put is on Internet Service Providers to do egress filtering on the outer edges of their networks, and ingress filtering on anyone they sell or rent a block of addresses to. That would actually reduce spoofing instead of just chasing it from protocol to protocol.

  • @BhargaviCN
    @BhargaviCN 5 лет назад +4

    The person who inserted "MONLIST" command in the protocol, is THE Culprit/Hacker! While misguiding you as "This is one useless command", he got way of hacking forever! Otherwise "last 600 users? Really? 600?", come on, you don't need Sherlock Holmes!

  • @HadienReiRick
    @HadienReiRick 10 лет назад +1

    Truly, I think the only way to defend against DoS attacks is to improve the protocol itself.
    For instance UDP could handshake every once in a while, with the receiver sending a single "flag" saying that you can continue with the streaming. This will not only stop DoS, but could also save server bandwidth since the server will know that it doesn't need to keep sending packets to a recipient that doesn't want to listen (this would greatly improve the stream quality of sites like Justin, Twitch, Hulu, and Netflix). And the recipient can effortlessly let only one UDP transfer through, or none at all.
    another protocol idea is that when a server receives a request for a large amount of data (TCP), or just always (UDP), it 1st sends a "handshake" confirmation to the destination to make sure they really want it. This solves 2 things as one the server can ignore duplicated requests from the same "source", and again save even more bandwidth if the source turned down the handshake. There may even be a "timeout" flag included so that even the confirmation handshakes themselves aren't spammed. The only way a criminal could bypass this is if they hack the actual servers themselves.

  • @garenyo
    @garenyo 10 лет назад

    i really love this channel and the explanation of Tom Scott is really great. No matter what topic he is telling.

  • @Charbthabowz123
    @Charbthabowz123 9 лет назад +116

    This man, should have his own T.V show!

    • @Ultima2876
      @Ultima2876 9 лет назад +53

      Charb thabowz He does, it's called Gadget Geeks.

  • @BlackSkorpion0
    @BlackSkorpion0 10 лет назад +1

    This is a great video, He explains the concepts very well.

  • @stevensong6909
    @stevensong6909 6 лет назад

    There is such amazing content on this channel.

  • @SleekMouse
    @SleekMouse 10 лет назад +324

    "How can you protect your servers? The easiest way to update to NTP version 4.2.7, which removes the monlist command entirely. If upgrading is not an option, you can start the NTP daemon with noquery enabled in the NTP conf file. This will disable access to mode 6 and 7 query packetts (which includes monlist).
    By disabling monlist, or upgrading so the the command is no longer there, not only are you protecting your network from unwanted reconnaissance, but you are also protecting your network from inadvertently being used in a DDoS attack."

  • @ashwith
    @ashwith 10 лет назад +30

    Please do a video explaining the heartbleed bug.

  • @callum3651
    @callum3651 8 лет назад +51

    ok wtf is there to dislike about this video??

  • @akash.trehan
    @akash.trehan 8 лет назад +5

    How did Tom get "206" times the data....Also "206 x ?" What is the basic thing whose 206 times is being sent?

  • @flastable9842
    @flastable9842 Год назад +2

    In the 8 years since this video's release, has this issue been resolved at all? Even partially?

  • @MrVljacks
    @MrVljacks 10 лет назад

    I love this guy..... so simply explained, well done...

  • @brianpso
    @brianpso 10 лет назад

    Wow! I don't really know what it is, but it's been a while since I watched this channel because of college stuff, and I feel like something changed on the transictions or the camera motion, that really make me get more concentrated on the video. I just loved his explanation, thanks so much for this video.

  • @shackelfro
    @shackelfro 10 лет назад

    I absolutely love these videos. Tom is the man!

  • @TechLaboratories
    @TechLaboratories 10 лет назад

    Tom, insightful as always!

  • @StaffanThomen
    @StaffanThomen 10 лет назад +1

    Aww, I expected you to mention amplification attacks in the IRC protocol itself and was disappointed. (CTCP VERSION or INFO for instance) These were all the rage when I just got on to IRCNet.

  • @JonathanGray89
    @JonathanGray89 9 лет назад +3

    The problem with UDP is the fact that there is no absolutely no protection against source IP spoofing; Any ISP that the UDP packets are traveling through cannot verify the legitimacy of those packets. Therefore, any public UDP service which can send more data than it receives is vulnerable to (D)DoS amplification, and in fact it is extremely trivial to accomplish this. With my knowledge and $1000 worth of VPS (like Amazon Web Services), I could bring down a big site for a couple of hours and make headlines. I would never risk it though because that would trace straight back to me. The people who do these attacks in the real world use BitCoins and Tor or VPNs only so that they're much harder to find. I don't have any BitCoins, no use for VPNs, and I personally find it immoral and even childish to perform DoS attacks. I find the technicalities slightly interesting but, compared to real vulnerabilities, to me it's just child's play.

  • @23Joe91
    @23Joe91 10 лет назад +1

    This is really interesting because I've noticed that some sites have been acting strangely last few days

  • @AustinHarsh
    @AustinHarsh 10 лет назад +3

    Nice video but fyi TCP doesn't require packets to be sent in order. It just makes sure that all packets are received at some point in time.

  • @Col_Crunch
    @Col_Crunch 10 лет назад +1

    I would love to see a feature-length Documentary (60-120mins) made by the computerphile guys! I imagine that it would be amazing.

  • @yzf
    @yzf 10 лет назад +1

    Sorry if this won't make sense, but can't that monlist type of communication/request be blocked by firewall? Doesn't it have some specific attribute that could be set to firewall rules and firewall just wouldn't let it through?

  • @PontusWelin
    @PontusWelin 10 лет назад +1

    Wouldn't it help to do something like greylisting at the NTP-servers?
    So if a request comes in for a monlist command, the server checks the greylist and if they aren't in it, it responds by telling them to try again later.
    I have heard it works very well against spam since spam bots don't have a reason to ever resend anything. They can just send another mail. Maybe it would work for this?

  • @carterknox3096
    @carterknox3096 7 лет назад

    Wow I just found this channel and I love it.

  • @wisteela
    @wisteela 9 лет назад

    Great info, and bonus points for the retro computer paper.

  • @thorlancaster5641
    @thorlancaster5641 8 лет назад +1

    6:00 If I were in charge of the Internet time protocol I would get rid of MONLIST immediately!

  • @twomorestars
    @twomorestars 10 лет назад

    Tom Scott is awesome. Thanks!

  • @everaven7925
    @everaven7925 6 лет назад +13

    I really want to know where Tom can still find Dot Matrix Printing Paper.

  • @JasperJanssen
    @JasperJanssen 8 лет назад +7

    Took 'em two years to get to terabit level attacks.

  • @dmaster254
    @dmaster254 9 лет назад +1

    Here's an interesting question that I just thought of. What are the chances that the average person will be the victim of a direct, intentional attack on their computer over the internet. I don't mean viruses or malwares that are designed to spread to as many networks as possible. I mean a direct attack from a hacker/generally unfriendly person onto their personal computer?

    • @theExtr3meGam3r
      @theExtr3meGam3r 9 лет назад +1

      +William Sculley Rather low, if your say somebody's grandfather that uses the computer only to read news articles - virtually never. if your someone that either has a geeky, tech enthusiast as a close friend or actually engages in arguments, etc online with other individuals then your chances are significantly higher but still rather low. generally speaking though you need to be in some sort of position that holds power, this could be: big youtuber, popular game dev, facebook famous, major corporation employee, etc.. just generally anybody with a large following or connected to an enterprise with a large influence. just think of it this way - the larger your following the more likely.
      NOTE: just because your chances are very low DOES NOT mean it can't and won't happen to you, it very well could.

    • @peepopoooooooooof
      @peepopoooooooooof 9 лет назад +6

      If you're a gamer or someone who engages in online communities. You would be very familiar with ddos attacks. Every 12 year old and has mates have access to ddos tools. You can buy 20-30min duration attack tools, for a few dollars.

    • @SebasCapo2013
      @SebasCapo2013 9 лет назад +2

      +William Sculley You can be sure that (Like +Vrox said) if you are a gamer, a normal DDoS will be something "normal" ... but a BIG DDoS or a REAL attack from a REAL (bad) hacker? No!, I'm not saying that you are no-one, but a REAL (bad) hacker has better stuff to do than scaring normal users... they would be working to find new way to fix this (probably because big companys pay for this kinda fixes, like Google) or going for the big stuff, or better known as "the big jackpot" :P. (I said "Real (bad) hackers" because HACKERS aren't bad, they work on finding exploits/bugs/security issues, but the bad people that get called "HACKERS" just for getting your Facebook conversations or e-mail password should be called Cyber Criminals).
      My point:
      :) Important people = High chances of being in Cyber Criminal's eye, anything else it's almost impossible

  • @TheVino3
    @TheVino3 10 лет назад

    It's scary to think that something so intangible and seemingly untouchable as the internet...could soon actually be very vulnerable.

  • @skimask13
    @skimask13 10 лет назад

    Great video and thanks for the book recommendation!

  • @MichelShadowforever
    @MichelShadowforever 10 лет назад +2

    Dude your awesome! Love your vids...just saying but couldn't this attack be used to crash an entire ISP?

  • @Systemist
    @Systemist 10 лет назад

    Loving this channel! Thanks for the great vids! :)

  • @nocgod
    @nocgod 10 лет назад +2

    AFAIK spoof attacks are averted on the ISP level. They see that the IP on the packet differs from the IP of the sender and just drop this packets...

  • @oliverguy3121
    @oliverguy3121 9 лет назад +4

    Note that the title says "disrupt" not "take down"

  • @Masquerola
    @Masquerola 9 лет назад +1

    Explaining DoS like a boss.

  • @AdamOzkan
    @AdamOzkan 10 лет назад

    I love his enthusiasm!

  • @JuanchosMRL
    @JuanchosMRL 10 лет назад

    That passion of his... Awesome video!!!

  • @nadehi18
    @nadehi18 7 лет назад +5

    Flash forward three years and we've seen 620Gbps attacks with zero amplification...

  • @ComputersAreRealCool
    @ComputersAreRealCool 9 лет назад +3

    Where did you get 206x the amount of data from? Surely it would be about 600x the amount of data, since one command sends a list of 600?

    • @kennethbgoodin
      @kennethbgoodin 9 лет назад +5

      ComputersAreRealCool because he's counting in bytes/bits, and that list of 600 contains a lot more than just one byte/bit per entry.

  • @StoryMakerZ86
    @StoryMakerZ86 10 лет назад +1

    Best video yet!! and easy even for me to understand!!!!

  • @leocossham
    @leocossham 10 лет назад

    Amazing video, well explained and extremely interesting; subscribed.

  • @Runs-InCircles
    @Runs-InCircles 10 лет назад +4

    You can defend against it if your home connection is being targeted by just using a vpn beforehand.
    You should always be using a vpn actually.

  • @-gd-bryan6530
    @-gd-bryan6530 9 лет назад +1

    What if you could sign up for a DDoS protection, if load of people sign up, you have loads of 'zombie computers' and those 'zombie computers' can attack the actual DDoS Hacker, if the attacked website has a protection code, which is basically a meter, that measures the amount of date that is received, if the data is exceeded, it will get the IP address of the attacker (by checking where the most amount of data comes from) and sends the right amount of 'zombie computers' to the IP address, so that IP address will be down in seconds, if there are enough zombie computers. The more zombie computers, the faster a hacker is down, the more hackers the system can take... Would that be a thing?

    • @joshuajurgensmeier4534
      @joshuajurgensmeier4534 9 лет назад

      +-GD- bryan What about making it seem like I am Google DDoSing you. Then you DDoS Google (; Then who wins?