During the time they were unable to receive email, a few employee email addresses got placed on a Mailgun bounce list with a status of 550 Administrative prohibition.įor some background, here’s how Mailgun describes a bounce, as found in the Mailgun documentation:īounce list stores events of delivery failures due to permanent recipient mailbox errors such as non-existent mailbox. All their sites use Mailgun and the Mailgun WordPress plugin for sending emails.
This client has a couple different WordPress sites with several employees receiving various notification emails.
This went un-noticed for a couple days (I didn’t manage the server at the time, I do now). As a result, they were unable to receive emails. I recently came across a situation where a client reached their disk usage limit. Manipulate Mailgun Bounce Lists: Show, Add, and Delete Email Addresses.
LOIC LINUX MAC
Once you’ve found that IP, go to the “Status” tab in the DD-WRT web interface, click “LAN”, find the IP that you suspected was the culprit from above and make a note of the MAC address associated with that IP. Now the key to tracking down the offending user/device is to look for a source IP (almost always a non-routable IP, like 192.168.1.x, 10.10.10.x or whatever) that shows up a LOT more often than other non-routable IP’s. Once you’ve clicked the “Run Commands” button, wait a few seconds, and you’ll eventually see some output similar to what you see in the image above, below is the raw text from the image: Click the “Run Commands” button below where you entered the command above. In the text area to enter commands, enter this: cat /proc/net/ip_conntrack 4. Click the “Administration” tab, and then click the “Commands” tab. To get to the bottom of it quickly, a simple command can be run from the DD-WRT web-based gui that will show all network connections on your DD-WRT router. Something was using all of my upstream bandwidth, wasn’t sure what device or who it was (had friends over). I just didn't have much to write about today.Find the bandwidth hog by viewing all network connections passing through your DD-WRT router I just think they deserve the hit for what they're doing. You wouldn't be likely to take them down without a strong network DDoS. I know a lot of people used DDoS attacks against the Egyptian government recently to support the protests over there, and I approve of things like that.Īlso sony recently started banning modified PS3s from online services, and I personally think that if you paid good money for the machine, it's yours to modify however you want and maybe they should be denied some services themselves, but I'm not suggesting you go out and target on your own. I've never heard of an arrest for a DoS, but have heard of a few for DDoSing(though it's incredibly rare and usually just if you're running the server).ĭeciding who to target: Use your power for good. Legal: DoSing(NOT DDoSing) is a legal grey area in most places but check local laws to be sure. Using a proxy: You can't LOIC with a proxy, the requests will hit the proxy and not the target and it defeats the purpose. The site in the background of the above picture is a useful tool for checking that a site is really down. If done correctly you'll see the targets IP number pop up in the display. In the "Select your Target" box you'd put in and click "Lock On". Since I own a share of the company I'd like to make sure my company's site is reliable. Sooo, for this example lets say I own stock in mastercard. So umm I guess I should absolve myself of liability and tell you not to use this to break the law, or something. This can be used for website stability testing by attacking your own site, it isn't purely for malicious purposes. Mine identified it as a hacker tool, which it is, but it isn't harmful to MY system, so i told it not to worry about it. Note that some antivirus products may give you a warning.
LOIC LINUX DOWNLOAD
You can get it at by clicking the big green download button. This program called LOIC is capable of sending a lot of requests very fast.ĭownload LOIC. LOIC = Low Orbit Ion Cannon, an easy to use GUI, for performing DoS or DDoS attacks.īasically DoS attacks work by overloading your target's servers with more page requests than they can handle.
LOIC LINUX HOW TO
Don't really know what to write about today, so I'm going to teach how to DoS a website using LOIC.ĭoS = Denial of Service, not to be confused with DOS(disk operating system), or GLaDOS (Genetic Lifeform and Disk Operating System).ĭDoS = distributed denial of service attack, which is linking a bunch of computers together to take down a target site.