Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"I'm growing older, but not up." -- Jimmy Buffett


devel / comp.programming.threads / More of my philosophy about Layer 7 DDoS attacks that are the “the new drug” and more of my thoughts..

SubjectAuthor
o More of my philosophy about Layer 7 DDoS attacks thaAmine Moulay Ramdane

1
More of my philosophy about Layer 7 DDoS attacks that are the “the new drug” and more of my thoughts..

<53ead5af-53ff-453f-b4ca-f54c508ecaf6n@googlegroups.com>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=672&group=comp.programming.threads#672

  copy link   Newsgroups: comp.programming.threads
X-Received: by 2002:a05:6214:cc3:b0:440:f5fc:f1ab with SMTP id 3-20020a0562140cc300b00440f5fcf1abmr12365628qvx.59.1648943324019;
Sat, 02 Apr 2022 16:48:44 -0700 (PDT)
X-Received: by 2002:ac8:5e4f:0:b0:2e2:2bad:4252 with SMTP id
i15-20020ac85e4f000000b002e22bad4252mr13154231qtx.231.1648943323791; Sat, 02
Apr 2022 16:48:43 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border2.nntp.dca1.giganews.com!nntp.giganews.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.programming.threads
Date: Sat, 2 Apr 2022 16:48:43 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=173.178.84.155; posting-account=R-6XjwoAAACnHXTO3L-lyPW6wRsSmYW9
NNTP-Posting-Host: 173.178.84.155
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <53ead5af-53ff-453f-b4ca-f54c508ecaf6n@googlegroups.com>
Subject: More_of_my_philosophy_about_Layer_7_DDoS_attacks_tha
t_are__the_“the_new_drug”_and_more_of_my_thoughts..
From: aminer68@gmail.com (Amine Moulay Ramdane)
Injection-Date: Sat, 02 Apr 2022 23:48:44 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Lines: 135
 by: Amine Moulay Ramdane - Sat, 2 Apr 2022 23:48 UTC

Hello,

More of my philosophy about Layer 7 DDoS attacks that are
the “the new drug” and more of my thoughts..

I am a white arab from Morocco, and i think i am smart since i have also
invented many scalable algorithms and algorithms..

I will say that according to Arbor Networks, 18% of all DDoS attacks seen in USA in 2015 were application-layer attacks or so-called Layer 7 attacks. Cloud and security solution provider F5 calls Layer 7 DDoS attacks “the new drug”, indicating that they are becoming both more common, more sophisticated and more threatening. So i think that Amazon AWS Shield Standard service that protects against Layer 3 and 4 DDoS attacks doesn't cost you anything, so you have to use Amazon AWS Shield Advanced service to protect yourself from Layer 7 DDoS attacks, and you can read how much is the cost of AWS Shield Advanced here in Amazon:

https://aws.amazon.com/shield/pricing/

So i think that Mid-size companies in USA can pay for AWS Shield Advanced, and a Mid-size company is defined in USA as one with average annual revenue – not profit, but revenue – of between $10 million and $1 billion. As of 2018, the center estimated that about 200,000 U.S. companies met that definition, making them mid-size companies.

More of my philosophy about the weakness of reverse engineering and more
of my thoughts..

I think i am really smart, and i say that the weakness of reverse engineering the code, is that when you crack a program you are
guided by previous known information about how to crack a program that helps you to crack the program, but understanding the meaning of the program that is obfuscated by VMProtect is a much more difficult process, this is the way to go for me.

More of my philosophy about the virtual machines of VMProtect and the like and more of my thoughts..

I think i am really smart, and here is the very important thing that
i have just said yesterday:

"But i think that one of the best protection against reverse engineering the code is also using virtual machines, but this way of doing has a weakness, since when a sample is protected with a VM, the only way to reverse engineer the code itself is to start with understanding the VM, but from what the experts know, a lot of VMs have two things in common:

They are not complex (sometimes the bytecode instructions themselves are just decoded into x86 instructions - usually some VM instructions as well), and they are usually quite obfuscated, so you will need to reverse engineer the VM and understand how it is decoding bytecode instructions - and what each VM instruction does, and then you can use that knowledge to transform bytecode back into its original form - at which point you can analyze it in IDA Pro etc.. Usually, the not so difficult part for the experts in reverse engineering the code is understanding the VM despite obfuscation."

So then even if the VMProtect uses many virtual machines for different
parts of the program, the weakness is that the virtual machine of VMProtect is not complex, so it is why it becomes easy for reverse engineering experts to "crack" it, so it is why the software company called Ubisoft has only managed to protect Assassin’s Creed Origins from pirates for a month using also the best tool that is VMProtect, read it here:

https://www.dsogaming.com/news/ubisoft-managed-protect-assassins-creed-origins-pirates-entire-month/

But the advantage of VMProtect is that it obfuscates the binary code
of your program, so since the binary code of your program can be much more difficult to understand than the obfuscated virtual machine , then it becomes much more difficult for reverse engineers experts to understand the meaning of the program code, and it is the way to go for me.

Read my previous thoughts:

More of my precision about VMProtect and about reverse engineering..

I think i am smart, an i think that experts in reverse engineering the code can crack your program even if you protect it with VMProtect, since the Virtual machine like the virtual machine of VMProtect are in general not so complex, but the experts in reverse engineering will find it difficult to understand the difficult algorithms of your program, so i think it is the way to go for me, and since reverse engineers experts can give the binary code that is cracked, but with this kind of way of doing you have to be aware that the cracked binary code can contain a virus, this is why a "trusthworthy" relationship between a software developer or developers and the customers is so important. And it is my way of doing that is creating a trusthworthy relationship with my customers and with you here in those newsgroups forums and such.

More of my philosophy about VMProtect and about obfuscation
and more of my thoughts..

I think i am smart, and i have just downloaded the trial version
of VMProtect that is the best tool to prevent reverse engineering of
your program, and i think that it is a good tool, and i have
just noticed that it also obfuscates not only the virtual machines,
but it also obfuscates the code, and as a proof of it, you can notice it by reading the following web page on the VMProtect website:

https://vmpsoft.com/support/user-manual/introduction/glossary/

So notice that it is saying in the above web page that VMProtect also
does the following:

"Obfuscation of Java / .NET applications is performed through transforming the bytecode processed by the virtual machine. Obfuscation of compiled programs relies on modifying machine language codes: the obfuscator adds various “garbage” commands, “dead code”, random jumps."

So i advise you to buy this good product that we call VMProtect from here:

https://vmpsoft.com/

So i will buy VMProtect and i will also use like the following service from a company in Canada that provides a copyright filled and certified by a public notary that is valid for 172 countries, you can read about it here:

http://en.scopyright.ca/

But you have to be smart, since the "patent" that protects an algorithm is not valid in so many countries such as India etc., so the best way is to use a copyright as i am doing it, so that this kind of copyright allows you to fill a lawsuit against binary code that is stolen from you by asking the one that has stolen from you to show his source code in
a legal lawsuit.

Thank you,
Amine Moulay Ramdane.


devel / comp.programming.threads / More of my philosophy about Layer 7 DDoS attacks that are the “the new drug” and more of my thoughts..

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor