Rambetter, on 03 April 2012 - 07:05 PM, said:
Hi Rambetter,
Thank you for your response! To be honest my binary is based on the mickael binary since on some our clan servers are smoke nades disabled and therefore I needed the lua scripting (we replaced yours in December 2011). I don't know if your binary acts the same way onto fake UDP packets.
Here is a little peace from the 10,000 packets-capture, click to download.
You can view it with Wireshark.
It contains fake-flood UDP packets and some sample of the "usual-drdos".
If you have any question, just write me.
Thanks for any help!
Rambetter, on 03 April 2012 - 07:05 PM, said:
So what do you think? The fake packets do network flood + CPU burn only on my server and not on any website then what should I think? The fake packets are not a random/ocassional thing, since this attack makes high pings in the last 1-2 weeks and still lasts. Sooner our snort rate limit rule was perfectly effective against the usual drdos packets.
So I am sure that this kind of attack is against the urbanterror server directly, I am just curios if our clan is the target or more (all) urbanterror servers are concerned.
Thanks for your answer in advance:
Snail
This post has been edited by LammeSnail: 04 April 2012 - 05:17 PM