Advertisements

D.D.o.S. & Doxing.

This page was formed by online researches. We are not specialists in any way. I am not responsible for any contents or outside programs that a user downloads–you are downloading at your own risk. If you’re an 8~10 year old, you may have some trouble absorbing the contents of this post.

In this community, many people claim to be “hackers”. Usually they aren’t as badass as they think they are and actually have little to no ability.  However some, while not the 1337 h4x0rz actively pursued by the FBI, are quite capable. The two biggest threats, which come as no surprise, are doxing and DDoSing.

DDoSing – A distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its users by overloading it with “internet packets”. Just imagine jellybeans being thrown at you one at a time, it starts with 1 jellybean being thrown over and over, and then 2, and then 3, and so on and so on until you either have to eat all the jellybeans or you explode.

Doxing – the practice of investigating and revealing a target subject’s personally identifiable information, such as home address, workplace information and credit card numbers, without consent.

Let’s tackle DDoSing first. In order to DDoS, the target’s IP address is required. Also known as an “IP number” or simply an “IP,” this is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. The most common ways of gleaning this information are as follows:

  1. WordPress comments
  2. IP grabbers

When you comment on a WordPress site, your IP address is logged for any site staff to see. To reduce your risk, only comment on trusted WordPress sites, like the ACP site and CPA Central. As for IP grabbers, just don’t click any suspicious-looking links that are given to you.

D.D.o.S.

Have I been DDoSed?

Here’s how to check:

  • First, we open a command prompt (click on the windows button and enter the words “cmd”):
    DDosGuide2.jpg
  • Next we will attempt to ping the outside world. Let’s try reddit. Type in  “ping cparmycentral.com” and press enter.
    DDosGuide3.jpg

The number next to “time=” is what we’re concerned about. This number will increase periodically during a DDoS attack (40ms to 800ms) and will eventually come up with an error of “Request timed out”. If the number does not change, or is below 40ms, you are not being DDoSed.

Most likely in CP armies the guy DDoSing is using some tool he found online, and probably hasn’t masked his IP address. If you’d like to figure out the culprit, download a program called TCPView. This program displays all open connections on your computer. The connection you see 100s of times is the one that’s attacking you. If you wish to take the legal route, plug this IP into whois.sc and report it to their Internet Service Provider.

Stopping a DDoS

  1. Unplug your cable/dsl modem as well as your router (for good measure) and wait 60-120 seconds. Plus back in and check http://www.whatismyip.com to see if you were assigned a new IP.
    • Some ISP’s put a TTL (Time to Live) on your IP for 8 to 24 hours so if you are under no time constraint then this can be attempted.
  2. Call your ISP and tell them that you are being DDoS’d and that you need a new IP. Depending on who you get on the phone, as well as your ISP will determine if they will or not. I haven’t heard of many people having issues however.
  3. Type your default gateway into your internet browser to bring up your routers admin page. You will need to google the type of router you have for the username/password. Some common ones are “root/password”, “admin/password”, “password/password”, “admin/admin”.
    Once you get in you can attempt to Release/Renew you IP here.

    DDosGuide7.jpg
  4. If the above doesn’t work then your next step is attempting to clone your mac address. This can be done here and is as simple as pressing the “Clone My PC’s MAC Address” button. You can only clone your mac address once but it should change your IP. This page will look like the following:

    Note: The MAC Address boxes will have letters and numbers. They have been blurred out here.

If your attacker keeps finding your IP try getting a VPN program or a proxy to mask your IP address. Here are a few good ones:

http://www.dreamvpn.us/index.php
https://www.torproject.org/

Doxing

Picture this: you come home tired from a long day at school, and log on to your computer to find that your personal information has been posted on Pastebin. The whole world knows who you are now. So how do you prevent this from happening?

  • Don’t make too many enemies, because you never know what they’re capable of.
  • Don’t use your real-life details for WordPress (i.e. e-mail).
  • Stop exposing your IP, which means not clicking on any suspicious links, or signing up for any suspicious website. Your I.P. address will be revealed to administrators/editors on any WordPress site if a person comments on it.
  • If you’re on Facebook, use your privacy settings!
  • Doxing can be prevented if you keep your personal information to yourself and yourself only.

If you’re really ambitious you could spread disinfo about yourself to confuse people trying to dox you. And if you’re really ambitious, you’ll figure it out.

This post was constructed by intel found on the web.

Constructed for the safety of Club Penguin troops.

[▼]

Advertisements

14 Responses

  1. It’s also pretty ridiculous what Club Penguin armies are turning into. DDoSing and Doxing over a Club Penguin game just makes me wonder what the hell is happening to us.

    I hope this post helps someone.

    • P.S. I was not the one to play a major role in the making of this post. Plagiarizing? No.
      A couple of people edited it.

  2. Maybe this post will teach people what it means to be DDoS’d

    • Or how to ddos

  3. I have ex. and I do not like it.

  4. CMD ddosing doesn’t work anymore. The ddosing is weak and it only works on sites with weak security. If you want to ddos cpac you need something called LOIC, a more powerful program than CMD POD (ping of death)

    Anyways more posts like these please 😀

    • LOIC isn’t the best tool for DDoSing either.

    • Dude, LOIC’s and POD’s suck. Even a RUDY is better. I suggest a firm bSOD if you want to get rid of someone for good. Other than that, a booter doesn’t “suck”

  5. I hope Elmikey reads this.

    • ^

  6. You’ll still get booted with a VPN.

  7. People freak out way too much over Doxing. Remind me of the 8 year old RPF Marine General whose going to drive to my house and stab me because he read my Dox. As for Ddosing, it happens, its annoying, but the culprit is never consistent with it and normally gets bored after a few days.

  8. These types of things are done by the Internet badasses of the community and should be given as little attention as possible.

  9. Reblogged this on Club Penguin Army Comedy Central.

What do YOU think? Comment your opinion!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: