Получи случайную криптовалюту за регистрацию!

CatOps

Логотип телеграм канала @catops — CatOps C
Логотип телеграм канала @catops — CatOps
Адрес канала: @catops
Категории: Технологии
Язык: Русский
Количество подписчиков: 5.51K
Описание канала:

DevOps and other issues by Yurii Rochniak (@grem1in) - SRE @ N26 && Maksym Vlasov (@MaxymVlasov) - Engineer @ Star. Opinions on our own.
We do not post ads including event announcements. Please, do not bother us with such requests!

Рейтинги и Отзывы

3.33

3 отзыва

Оценить канал catops и оставить отзыв — могут только зарегестрированные пользователи. Все отзывы проходят модерацию.

5 звезд

0

4 звезд

2

3 звезд

0

2 звезд

1

1 звезд

0


Последние сообщения 12

2022-02-25 02:02:53 There are also tools like Vegeta, if you don't try SourceForge. It's on GitHub and written in Go

https://github.com/tsenart/vegeta
1.2K views23:02
Открыть/Комментировать
2022-02-25 01:57:50 Set "Threads" to the number of threads you would like to use. Higher = more pressure, and probably easier for your countermeasures to detect.
14. Again: Make sure you actually own the website that you target. Targeting someone else's website might very well be illegal, and could cause problems for the website and its' users.
15. If you (for whatever reason) get the stupid idea to ever target a website that you do not own (DO NOT DO THAT), potentially consider maybe using a VPN or something? (But only if using a VPN is legal in your country)
16. Press "FIRE TEH LAZER!"
17. Do the same thing on your other computers, or have your friends help out. Make sure they all enter your website's URL as their target.

# Request for hackers & developers

I have a feeling that there might very well be a lot of people out there who want to stress-test websites that are owned by themselves, themselves alone, and definitely not by russians, but that might not be comfortable installing software that is classified as malware.

As such, it would be absolutely wonderful if someone could create and host a web-based (preferrably open-sourced) alternative. I'm not sure how doable it is, but if it's possible, I'm sure people would find it very useful.

Long live Ukraine!
1.2K views22:57
Открыть/Комментировать
2022-02-25 01:57:50 Dear tech community,

I found an interesting link on Reddit:

https://www.reddit.com/r/ukraine/comments/t0m50l/how_to_use_hoic_high_orbit_ion_cannon_to/

I will copy the text here for convenience.

How to use HOIC ("High Orbit Ion Cannon") to stress-test websites that are owned by you, and you alone, and that are absolutely not owned by russian entities.

So, for no particular reason I feel like explaining how to use the piece of software called HOIC to stress-test websites that you own.


# Introduction

HOIC, or "High Orbit Ion Cannon" is a piece of software that can be used to stress-test websites and other online services. What it does is it simply sends a bunch of requests to a URL that you specify. It is the successor to "LOIC", or "Low Orbit Ion Cannon", which was used by the hacktivist collective Anonymous during Operation Payback to bring down websites of entities that fought against internet freedoms.

It is available on [SourceForge](https://sourceforge.net/projects/highorbitioncannon/) and has been classified as malware because it can be used in a malicious manner. LOIC is also [available on the same website.](https://sourceforge.net/projects/loic/)

To properly stress-test a website that you own, you would likely either need to own several computers on different networks, or have a bunch of friends that could help you by targeting the same website/IP-address.

# Be wary

If you decide that stress-testing websites is something that you would like to do, I would suggest that you personally make sure that you do in fact trust the software. In these times, we need to be wary, and there is no way for you to know that I am not a malicious actor promoting actually malicious software.



When attempting to unzip the tool, Windows Defender will give you two malware warnings, "DDoS:VBS/Hoic.A" and "HackTool:Win32/Hoylecann.A"

You can read what Microsoft has to say about this tool on the following links:

[https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:Win32/Hoylecann.A](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=HackTool:Win32/Hoylecann.A)

[https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=DDoS:VBS/Hoic.A](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=DDoS:VBS/Hoic.A)

# How to use HOIC

Honestly, it's really fucking simple. The most difficult part is allowing the software through your antivirus software.


1. Download the zipped up archive from sourceforge. The link can be found above. Seeing as SourceForge detects malware in the software, you have to go through an extra click.
2. Unzip the archive.
3. If you're on windows, Windows Defender will likely stop you. If you are sure you know what you're doing and you want to proceed anyways, you'll have to click the notification, click the threat "DDoS:VBS/Hoic.A" and select "Allow on Device" followed by "Start actions".
4. Click "Yes" to confirm the action using admin privileges.
5. In the prompt for moving/copying files, press "try again". If you've already closed that prompt, you can simply unzip the file again. This time it should let you.
6. Once you've successfully unzipped the archive, open the folder "Hoic" and run "hoic2.1.exe"
7. Press the "+" button under "TARGETS"
8. Enter the URL that you wish to stress-test, e.g. "[https://somewebsite.org](https://somewebsite.org)" or "[https://www.rt.com](https://www.rt.com)"
9. Make sure you actually own the website that you target. Targeting someone else's website might very well be illegal, and could cause problems for the website and its' users.
10. Set "Power" to whatever you prefer. The higher you put it, the more pressure will be put on the target. Setting it higher might trigger counter-measures more easily, so you might want to keep it at Low or Medium in order to properly test whether your website still manages to detect the attack etc.
11. I'm not sure how to use Booster, so either figure it out yourself or leave it blank
12. Click "Add".
13.
1.3K views22:57
Открыть/Комментировать
2022-02-24 20:18:03 How to donate to help Ukrainian army

We are currently receiving numerous inquiries about our organization's bank details.

We thank everyone who donates and post the bank data for charitable contributions in a separate publication.

Let's win together

Transfers from abroad:

Fondy.eu: https://pay.fondy.eu/s/1stPBTgMbWTY
Currency of transfer – UAH. If your card currency is not UAH, funds will be withdrawn according to the rate. The commission of 2.7% is paid by the recipient

SWIFT
Company Name
CO "INTERNATIONAL CHARITABLE FOUNDATION "COME BACK ALIVE"
IBAN Code (Euro)
UA093052990000026004025029786
IBAN Code (U.S. dollar)
UA173052990000026009035028620

Name of the bank
JSC CB "PRIVATBANK", 1D HRUSHEVSKOHO STR., KYIV, 01001, UKRAINE
Bank SWIFT Code
PBANUA2X
Purpose of payment:
Charitable donation to Ukrainian military

Bitcoin Wallet
Number: bc1qkd5az2ml7dk5j5h672yhxmhmxe9tuf97j39fm6

If you want to support foundation «COME BACK ALIVE» team:

1) CO «INTERNATIONAL CHARITABLE FOUNDATION COME BACK ALIVE"
IBAN: UA793052990000026001045003547
ЄДРПОУ: 42046152
Payee:
Громадська організація «ПОВЕРНИСЬ ЖИВИМ!»
Purpose of payment: Благодійна пожертва на статутну діяльність.
2) Patreon: https://www.patreon.com/savelife_in_ua
1.6K views17:18
Открыть/Комментировать
2022-02-24 17:32:27 Тримаємося разом, зберігаємо спокій, віримо в ЗСУ!
1.4K views14:32
Открыть/Комментировать
2022-02-23 13:32:23 Recently, I asked my subscribers what topics are interesting to them and a few people mentioned observability.

That’s funny, ‘coz yesterday I accidentally bumped into a great series of articles on setting SLAs for your products by Alex Ewerlöf!

- Calculating composite SLA - truly outstanding read!
- Some practical advice when setting SLA - notice, it says SLA, not SLO. So, there are some business related tips in this article as well. However, the core is technical, ofc.
- Calculating the SLA of a system behind a CDN - I haven’t read this one yet. But given the quality of previous two, I expect this one be great as well!

tl;dr for the first article in the list:

for serial, multiply availability; For parallels, multiply unavailability


I would personally also add that when you try to set a “full” SLO(A) for your service, that is also a composite SLO(A). You should treat it as a serial. For example, if you have 99.8% error rate SLO and 99.1% latency SLO, an “overall” SLO would be 0.998 0.991 100% = 98.9%

That’s not only good to know, but you may also want to write your marketing materials differently. There is a difference between:

> We guarantee 99.8% SLO on 5th error rate and 99.1% SLO on requests not taking longer than X milliseconds.

And

> We guarantee the 98.9% availability of our systems.

I’m not a marketing person, though. I don’t know what’s better. What I do know is that:”Nines doesn’t matter, if your users are unhappy”.

#observability #slo #sla
1.1K views10:32
Открыть/Комментировать
2022-02-22 13:52:09 https://twitter.com/antonbabenko/status/1496063650607550465?s=28
1.4K views10:52
Открыть/Комментировать
2022-02-21 12:28:16 Back in a day, a friend of mine was ranting that this is not that obvious to spin up a VPN server in Kubernetes as online tutorials suggested.

Now, you can make a Wireguard operator do it for you. I haven't personally tested this operator. Yet, it has some positive comments on Reddit.

#kubernetes #networking
1.1K views09:28
Открыть/Комментировать
2022-02-20 19:30:04 Ever wondered, how a TCP connection works in slow-mo?

Here's an article just about that. There's a video as well. The link is in the article.

TBH, would be nice if this article covers not only the basics of TCP, but other features as well. Like RST packets.

Also, here's an interesting investigative read, which is not exactly about TCP, but it's features played thy key role for the investigation. Or this case, that actually happened in my company

#networking #tcp
1.2K views16:30
Открыть/Комментировать
2022-02-18 19:21:09 ​​Finally I got my things together and published the results of the Kubernetes Survey! Many thanks to everyone, who participated in this survey!

The first part is available in English. Also, you can find it in Ukrainian here.

To be honest, I’m not even sure what was easier: write the original post or translate it, haha.

The second part will be available soon. So, stay tuned!

#kubernetes
868 viewsedited  16:21
Открыть/Комментировать