Wednesday, September 15, 2010

Hacking as a Service (HaaS)

On Monday this week there was a very interesting post by Andy Greenberg a blog writer for which introduces a botnet herd standing by for payment and targeting instructions to launch a powerful Distributed Denial of Service (DDoS) attack. It appears based on his research that the botherd called "I'm DDOS" and available at "" is supposed to be used for testing purposes, however it is not clear how any type of target validation would or could be done by the company running the service to validate the target belongs to the attacker. You can see from the User Interface (UI) that the service looks to be fairly easy to use making it a likely attack tool for anyone with minimal computer skills and a grudge.

As with pioneers in computer infrastructure as a service, such as Salesforce and Amazon’s EC2 cloud, cyber arms dealers have begun asking customers, “Why buy when you can rent?” Renting cyber attack capabilities allows a political activist, terrorist group, or nation state to launch an attack on an online application - on demand. Those familiar with Cloud Computing and Software as a Service should recognize this as being the malicious equivalent - "hacking as a service".
It is clear that the "?? as a Service" model is going to be popular for people wanting to bring their products to market quickly and for those that want to see results with minimal up front capital costs.


  1. The site requires a java script even to enter. Will some body clarify if it is safe to enter the site?

    1. I am glad that I saw this post. It is informative blog for us and we need this type of blog thanks for share this blog, Keep posting such instructional blogs and I am looking forward for your future posts.
      Cyber Security Projects for Final Year

      JavaScript Training in Chennai

      Project Centers in Chennai

      JavaScript Training in Chennai

  2. The company that allows a probe into its security system must give a legal consent to the moral hacking school in writing.

  3. The ethical hacking salary within most companies is comfortably high (relatively speaking) and rightfully so because as aforementioned, they are saving the company a lot of money, and require specialist skills.

  4. My friends told me read this article and that's probably the only good thing they've told me to do. I got a mail from one of my friends that said click here and I did and this article opened. I read the article and I think that this article is one of the most incredible articles that I have read in my whole life.

  5. This knowledge is often always abused to get access to confidential information such as personal information, financial information and other such confidentialities.Wireless Hacking

  6. Excellent post, thanks for this. I gathered lots of information from this and I am happy about it. Do share more updates.
    We as a team of real-time industrial experience with a lot of knowledge in developing applications in Ethical Hacking , Certified Ethical hacking, python programming , aws training , ccna training (7+ years) will ensure that we will deliver our best in python training in chennai. , and we believe that no one matches us in this context.

    ccna training in chennai
    aws training in chennai
    aws devops training in chennai
    python training
    python training in chennai
    python training
    ceh training in chennai
    ethical hacking course in chennai
    ethical hacking training in chennai

  7. For instance, a $10 wager at 4.50 would return $45, which encompasses a $35 1xbet revenue and the return of your $10 stake. A wager on the Rangers would require them to win by 2 or extra targets. A wager on the Devils would pay off in the event that they} won or lost by a single goal. Track your bets and see cash out offers immediately in theScore!