00:00:00

Giant Bomb Presents

Giant Bomb Presents: Introducing Gino Grieco

Austin chats with Gino Grieco, the latest Giant Bomb guest contributor, about writing, martial arts, city planning, and network security. You know, four very closely related topics.

Giant Bomb Presents is giantbomb.com's home for interviews, previews, and more.

Mar. 30 2016

Posted by: Austin

In This Episode:

Hacking

Martial Arts

City

18 Comments

Avatar image for hassun
hassun

10300

Forum Posts

191

Wiki Points

0

Followers

Reviews: 0

User Lists: 2

Tell me all of the secrets to a happy marriage.

Avatar image for mikelemmer
MikeLemmer

1535

Forum Posts

3089

Wiki Points

0

Followers

Reviews: 54

User Lists: 2

@hassun said:

Tell me all of the secrets to a happy marriage.

Kick your assailant in the genital triangle.

Avatar image for thatpinguino
thatpinguino

2988

Forum Posts

602

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

thatpinguino  Staff

@hassun: I'll do a bit more research and get back to you.

Avatar image for stressedoutcat
StressedOutCat

289

Forum Posts

20

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Edited By StressedOutCat

it was a good read, and interesting interview

the one thing I will add that network equipment is becoming more automated or 'smart'

where pattern inspection of packets like the ones Verisign, F5 or Nexusguard provides for its costumer is becoming better and more able to stop DDoS attacks once they happen.

so its not impossible to stop DDoS attacks in the cases of Xbox live and PSN, it just very costly to do it at that scale.

Avatar image for ac_shredder
AC_Shredder

67

Forum Posts

1

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

This podcast's tags could make an amazing anime: Martial Arts Hacking City.

Avatar image for thatpinguino
thatpinguino

2988

Forum Posts

602

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

thatpinguino  Staff

@stressedoutcat: Good to know! Like I said in the interview, I'm not an expert so it's good to hear that more strides are being made. Are those pieces of equipment used in the ISP level or the corporate server level?

Avatar image for stressedoutcat
StressedOutCat

289

Forum Posts

20

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Edited By StressedOutCat

@thatpinguino: can be used both, it depends on how big of a infrastructure you want to protect.

the way it works is the Ddos protection filters out traffic by having all the traffic go to their services first, which filters out normal traffic from the 'bad' traffic.

normal traffic gets routed to the servers.. 'bad traffic' simply gets dropped.

the thing to keep in mind is that companies the size of Microsoft or Google do not deal with ISPs, they deal with multiple peering providers.. basically they have multiple direct lines going to their multiple data centers around the word directly.. so it no longer viable to do it at 'ISP level'.

Avatar image for thatpinguino
thatpinguino

2988

Forum Posts

602

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Edited By thatpinguino  Staff
Avatar image for wrathofgod
WrathOfGod

938

Forum Posts

242

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Ok here's my pitch: a new series in which I ask every user on Giant Bomb about the origin of their username.

Avatar image for mach_go_go_go
mach_go_go_go

518

Forum Posts

144

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Avatar image for d_w
D_W

1973

Forum Posts

2440

Wiki Points

0

Followers

Reviews: 10

User Lists: 21

This was a great podcast. It's really nice to see community members on in some sort of official way.

@hassun: according to my great Uncle Eddy, it was to turn of his hearing aid.

@wrathofgod: It's the initials of my first and middle name with an underscore. Inventive, I know.

Avatar image for naoiko
Naoiko

1680

Forum Posts

2703

Wiki Points

0

Followers

Reviews: 0

User Lists: 2

Grats duder! Awesome read and good interview. =) Looking forward to seeing what you do next.

Avatar image for wrongway
wrongway

3

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Edited By wrongway

Cool podcast and article.

But I have some comments about DOS attacks in general. For background I work in cyber security at a major bank as an in house hacker. I have to deal with DOS attacks pretty much once a month there are many protections against them. Many people don’t understand that a DOS attack may not be just about volume of traffic.

The simplest DOS attack is the equivalent of walking away half way through a sentence. The TCP “handshake” that happens pretty much anytime you are using the TCP protocol. In the past you could just send the start of the handshake and the server would sit and wait for a response. Do this a couple 1000 times and the server wouldn’t be able to respond to anyone. Now this particular attack isn’t found that often and if you are vulnerable to attack this way fire who ever set up your network.

Another kind of attack witch is exploit based. It simply that whatever underlying Service or Deamon has a security flaw. This allows an attacker to crash the target computer or whatever is running the website on that server with a handful of packets. Attacks that simply crash services are more common but not as fun as the ones that allow you to gain control but are still risks.

Also I second what StressedOutCat said. (F5 for lyfe)

Avatar image for thatpinguino
thatpinguino

2988

Forum Posts

602

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

thatpinguino  Staff

@wrongway: I actually describe a bit of that half handshake sort of thing in a blog I wrote about DDoS attacks. We didn't really have time to dive into all of the different permutations in the interview or the article, but I always love hearing about the different, weird techniques people figure out.

Avatar image for wrongway
wrongway

3

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

@thatpinguino: Oh ya I didn't mean you should have dived into all the different types. Just wanted to share some real world examples of how a attack works in general. Also people think that if they understand the analogy they understand the method and these can be very different.

Avatar image for zockroach
zockroach

117

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

AY GINO!

Avatar image for onemanarmyy
Onemanarmyy

6406

Forum Posts

432

Wiki Points

0

Followers

Reviews: 2

User Lists: 0

Edited By Onemanarmyy

@thatpinguino: i just realized your name is part of your nickname, because of the way Austin said it. Well Gino isn't Guino but you get the point :P

Avatar image for curryspiced
CurrySpiced

1470

Forum Posts

0

Wiki Points

0

Followers

Reviews: 0

User Lists: 0

Oh, cool. The guest contributor is one of the site mods, I had no idea.