shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

270
active users

#booter

0 posts0 participants0 posts today
KrebsOnSecurity RSS<p>KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS</p><p><a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/05/kr</span><span class="invisible">ebsonsecurity-hit-with-near-record-6-3-tbps-ddos/</span></a></p><p> <a href="https://burn.capital/tags/U" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>U</span></a>.S.DepartmentofJustice <a href="https://burn.capital/tags/InternetofThings" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InternetofThings</span></a>(IoT) <a href="https://burn.capital/tags/KaikeSouthierLeite" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaikeSouthierLeite</span></a> <a href="https://burn.capital/tags/Ne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ne</span></a>'er-Do-WellNews <a href="https://burn.capital/tags/ALittleSunshine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ALittleSunshine</span></a> <a href="https://burn.capital/tags/TheComingStorm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheComingStorm</span></a> <a href="https://burn.capital/tags/DamianMenscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DamianMenscher</span></a> <a href="https://burn.capital/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>-for-Hire <a href="https://burn.capital/tags/ProjectShield" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectShield</span></a> <a href="https://burn.capital/tags/Aisurubotnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aisurubotnet</span></a> <a href="https://burn.capital/tags/Breadcrumbs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Breadcrumbs</span></a> <a href="https://burn.capital/tags/QiAnXinXLab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QiAnXinXLab</span></a> <a href="https://burn.capital/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudFlare</span></a> <a href="https://burn.capital/tags/stresser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stresser</span></a> <a href="https://burn.capital/tags/Akamai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Akamai</span></a> <a href="https://burn.capital/tags/booter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>booter</span></a> <a href="https://burn.capital/tags/Jigsaw" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Jigsaw</span></a> <a href="https://burn.capital/tags/Forky" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forky</span></a> <a href="https://burn.capital/tags/mirai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mirai</span></a> <a href="https://burn.capital/tags/yfork" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yfork</span></a> <a href="https://burn.capital/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://burn.capital/tags/fbi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fbi</span></a></p>
DesertFOX<p>MS. PAC-MAN for IBM-PC. From 1983. Okay, I am really bad at this game... but at least the emulation is working! 😉 </p><p><a href="https://techhub.social/tags/RetroGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RetroGaming</span></a> <a href="https://techhub.social/tags/Booter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Booter</span></a> <a href="https://techhub.social/tags/FloppyDisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FloppyDisk</span></a> <a href="https://techhub.social/tags/PCGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCGaming</span></a> <a href="https://techhub.social/tags/DOSGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOSGaming</span></a> <a href="https://techhub.social/tags/Atari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atari</span></a> <a href="https://techhub.social/tags/Arcade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arcade</span></a> <a href="https://techhub.social/tags/PacMan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PacMan</span></a> <a href="https://techhub.social/tags/80s" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>80s</span></a> <a href="https://techhub.social/tags/Emulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Emulation</span></a> <a href="https://techhub.social/tags/86Box" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>86Box</span></a></p>
DesertFOX<p>Sometimes, I just love to dig into really old games. Here's 1983s "Ms. Pac-Man" from Atarisoft. The game came on a double-density, single-sided 5.25inch disk of 160K. But when you tried to look into it from DOS, it just seem completely empty, because it's a "Booter" without a file system. Interestingly, this one doesn't seem to be copy-protected at all.</p><p>P.S. Here's the link:<br><a href="https://archive.org/details/pc_mspacman_kfraw" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">archive.org/details/pc_mspacma</span><span class="invisible">n_kfraw</span></a></p><p><a href="https://techhub.social/tags/RetroGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RetroGaming</span></a> <a href="https://techhub.social/tags/Booter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Booter</span></a> <a href="https://techhub.social/tags/FloppyDisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FloppyDisk</span></a> <a href="https://techhub.social/tags/PCGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PCGaming</span></a> <a href="https://techhub.social/tags/DOSGaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOSGaming</span></a> <a href="https://techhub.social/tags/Atari" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atari</span></a> <a href="https://techhub.social/tags/Arcade" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Arcade</span></a> <a href="https://techhub.social/tags/PacMan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PacMan</span></a> <a href="https://techhub.social/tags/80s" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>80s</span></a></p>
BrianKrebs<p>Most people who operate DDoS-for-hire businesses attempt to hide their true identities and location. Proprietors of these so-called “booter” or “stresser” services — designed to knock websites and users offline — have long operated in a legally murky area of cybercrime law. But until recently, their biggest concern wasn’t avoiding capture or shutdown by the feds: It was minimizing harassment from unhappy customers or victims, and insulating themselves against incessant attacks from competing DDoS-for-hire services.</p><p>And then there are booter store operators like John Dobbs, a 32-year-old computer science graduate student living in Honolulu, Hawaii. For at least a decade until late last year, Dobbs openly operated IPStresser[.]com, a popular and powerful attack-for-hire service that he registered with the state of Hawaii using his real name and address. Likewise, the domain was registered in Dobbs’s name and hometown in Pennsylvania.</p><p><a href="https://krebsonsecurity.com/2023/01/thinking-of-hiring-or-running-a-booter-service-think-again/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2023/01/th</span><span class="invisible">inking-of-hiring-or-running-a-booter-service-think-again/</span></a></p><p>Saved the best quote till the end, from <span class="h-card"><a href="https://infosec.exchange/@nixonnixoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>nixonnixoff</span></a></span> :</p><p>"“When a booter service claims they don’t share logs, they’re lying because logs are legal leverage for when the booter service operator gets arrested,” Nixon said. “And when they do, you’re going to be the first people they throw under the bus.”</p><p><a href="https://infosec.exchange/tags/booter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>booter</span></a> <a href="https://infosec.exchange/tags/stresser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stresser</span></a> <a href="https://infosec.exchange/tags/ddosforhire" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddosforhire</span></a> <a href="https://infosec.exchange/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://infosec.exchange/tags/Dobbs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dobbs</span></a> <a href="https://infosec.exchange/tags/IPStresser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IPStresser</span></a></p>
Marcus "MajorLinux" Summers<p>Capitalism comes for us all sometimes...</p><p>Prosecutors charge 6 people for allegedly waging massive DDoS attacks <a href="https://arstechnica.com/information-technology/2022/12/prosecutors-charge-6-people-for-allegedly-waging-massive-ddos-attacks/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/information-te</span><span class="invisible">chnology/2022/12/prosecutors-charge-6-people-for-allegedly-waging-massive-ddos-attacks/</span></a></p><p><a href="https://toot.majorshouse.com/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Booter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Booter</span></a> <a href="https://toot.majorshouse.com/tags/Stressor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Stressor</span></a> <a href="https://toot.majorshouse.com/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a></p>
BrianKrebs<p>The U.S. Department of Justice (DOJ) today seized four-dozen domains that sold “<a href="https://infosec.exchange/tags/booter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>booter</span></a>” or “<a href="https://infosec.exchange/tags/stresser" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stresser</span></a>” services — businesses that make it easy and cheap for even non-technical users to launch powerful Distributed Denial of Service (<a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a>) attacks designed knock targets offline. The DOJ also charged six U.S. men with computer crimes related to their alleged ownership of the popular DDoS-for-hire services.</p><p>The DOJ said the 48 domains it seized helped paying customers launch millions of digital sieges capable of knocking Web sites and even entire network providers offline.</p><p>One of the defendants has allegedly been peddling DDoS for more than a decade. John M. Dobbs, 32, of Honolulu, HI is charged with aiding and abetting violations of the CFAA related to the operation of IPStresser[.]com, which he allegedly operated for nearly 13 years until last month. During that time, IPstresser launched approximately 30 million DDoS attacks and garnered more than two million registered users.</p><p><a href="https://krebsonsecurity.com/2022/12/six-charged-in-mass-takedown-of-ddos-for-hire-sites/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2022/12/si</span><span class="invisible">x-charged-in-mass-takedown-of-ddos-for-hire-sites/</span></a></p>