<div dir="ltr">Josh,<div><br></div><div>It's enough to test and simulate DDoS projected numbers and analyse the data. Do you really think pushing 10gbits+ anywhere in Australia won't raise a few alarm bells and cause havoc? I know no transit provider would appreciate uncontrolled booter testing on their networks because someone thought it was cool. Australian pipes are tiny in caparison to anywhere else and any DDoS of that scale locally affects literally everyone who traverses through it. </div>
<div><br></div><div><br></div><div><br></div><div class="gmail_extra"><div class="gmail_quote">On Sat, Oct 19, 2013 at 10:42 PM, Joshua D'Alton <span dir="ltr"><<a href="mailto:joshua@railgun.com.au" target="_blank">joshua@railgun.com.au</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Oh sure that would work from layer 7 perspective, probably, but I'm not sure about the other attacks that involve a thousand - tens of thousands of hosts to achieve the level of bandwidth. Or is AWS able to deliver 100mbps+ x50 nodes minimum?</div>
<div class="HOEnZb"><div class="h5">
<div class="gmail_extra"><br><br><div class="gmail_quote">On Sat, Oct 19, 2013 at 10:38 PM, Peter Betyounan <span dir="ltr"><<a href="mailto:peter@serversaustralia.com.au" target="_blank">peter@serversaustralia.com.au</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Spin up a swarm of 50 or so EC2 instances and write a few lines of code. Press a button and sit back and watch. Many companies already do this the legal way, I am not too happy about advertising these methods to places like whirlpool which in turn is just empowering kids who think it's fun and cheap. Even if you educated one single person on what a booter is the damage is done already.<div>
<div><br></div><div><div><div class="gmail_extra">
<br><br><div class="gmail_quote"><div><div>On Sat, Oct 19, 2013 at 10:26 PM, Joshua D'Alton <span dir="ltr"><<a href="mailto:joshua@railgun.com.au" target="_blank">joshua@railgun.com.au</a>></span> wrote:<br>
</div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div>
<div dir="ltr">Can you elaborate?<br><div class="gmail_extra"><br><br><div class="gmail_quote"><div>On Sat, Oct 19, 2013 at 12:16 AM, Dobbins, Roland <span dir="ltr"><<a href="mailto:rdobbins@arbor.net" target="_blank">rdobbins@arbor.net</a>></span> wrote:<br>
</div><div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><br></div>
There are legal, safe ways to test resilience to DDoS attacks; but using a service of this type isn't among them.<br><br></blockquote></div></div><br></div></div>
<br></div></div><div>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></div></blockquote></div><br></div></div></div></div></div>
</blockquote></div><br></div>
</div></div></blockquote></div><br></div></div>