Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

How to automate a DoS attack using the Post Office - (My daughter was victim of attack)
theregister.com ^ | Published Monday 14th April 2003 12:19 GMT | JOHN LEYDEN

Posted on 05/03/2005 7:39:32 PM PDT by Shieldmaiden

Fancy taking revenge on someone you don't like by deluging someone with junk mail?

A little bit of knowledge can go a long way. Thanks to the increased readiness of companies to send out brochures and magazines to anyone who bothers to register online, the US Postal Service can become the agent of denial of service attacks.

This much is well known, but a recent paper (right here: http://www.avirubin.com/scripted.attacks.pdf) by security researchers Simon Byers, Aviel Rubin and Dave Kormann demonstrates how to automate this attack.

If you type the following search string into Google -- "request catalogue name address city state zip" -- you'll get links to over thousands of Web forms where you can type in your information and receive a catalogue in the mail.

It'd be a tedious business to fill out many forms.

But anyone with a modest amount of programming skills, and a target's snail mail address, can automate the attack and deluge their victims with junk mail.

Last December, self-styled "spam king" Alan Ralsky let slip his snail-mail address. Internet activists seized on this information to deluge him with unwanted snail mail.

Within weeks he was getting hundreds of pounds of junk mail per day and was unable to find his real mail amongst the deluge.

A pleasantly ironic attack, made all the more satisfying by Ralsky's outraged reaction.

That attack took the collective effort of many thousands but automating the attack leaves us all vulnerable.

Noted security and encryption guru Bruce Schneier believes there is no easy defence against the attack.

"Companies want to make it easy for someone to request a catalogue. If the attacker used an anonymous connection to launch his attack -open wireless networks would be a good choice - I don't see how he would ever get caught," Schneier observes.

"Even worse, it could take years for the victim to get his name off all of the mailing lists," he adds.

Individual catalogue companies can protect themselves by blocking automated signups (inserting a step that a person can easily do, but a machine can't). But it only takes a limited percentage to omit this check for the attack to work.

Schneier isn't convinced this will happen.

"The attack works in aggregate; each individual catalogue mailer only participates to a small degree. There would have to be a lot of fraud for it to be worth the money for a single catalogue mailer to install the countermeasure," he writes.

Schneier concludes that as old physical process is moved onto the Internet such attacks are likely to become more prevalent.

Which isn't nice. ®

External Links


TOPICS: Business/Economy; Crime/Corruption; Culture/Society
KEYWORDS: newbie; privacy; spam
Navigation: use the links below to view more comments.
first previous 1-2021-24 last
To: cynwoody

The postal inspector says this is a growing trend. Obviously NOT "old trend" since its happening to my daughter. Since this teacher is not the brightest bulb in the box, I suspect they read it on some liberal site, or was given evil advice. Perhaps there is a newer article on this subject, I don't know.


21 posted on 05/03/2005 9:21:06 PM PDT by Shieldmaiden
[ Post Reply | Private Reply | To 20 | View Replies]

To: Shieldmaiden

The "mail" can be sold as scrap metal is. Don't know the price/lb. but there are businesses, that buy this sort of item.


22 posted on 05/03/2005 10:15:15 PM PDT by Waco
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #23 Removed by Moderator

To: Yehuda

Not really. You can set your MAC address to be whatever you want. Just change it hourly or daily. And there's no way to identify anything from someone accessing an unsecured wireless internet connection. You'd have to get lucky and happen to have a random camera in the area happen to catch the person in the act.

Assuming you're halfway computer saavy, you wouldn't ever get caught.


24 posted on 05/03/2005 11:06:34 PM PDT by Advil
[ Post Reply | Private Reply | To 23 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-24 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson