VoiP DDoS Mitigation Explained With Ray Orsini from OITVoiP

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
tom here from lawrence systems and we're going to clear up some misconceptions like that you can stop a ddos attack by putting cloudflare in it and i know that but i don't know the next answer of exactly how you stop a ddos attack but this guy does ray or cine how you doing ray good tom how you doing man so ray is an expert and he runs oit voip and rey is the reason my phones are ringing now which makes me happy but i was actually joking that it didn't make my staff completely happy they're like you know we did kind of like it when phones didn't ring but i did remind them if the phones don't ring the checks probably won't cash either so you know we sorted that out pretty quick clients expect to reach you for some for some reason or another so this is kind of a follow-up i did a video the other day on voip mess just kind of explaining what we know about the situation the only thing we know more about the situation a few days later and today is uh september 24th 2021 is that it's still happening which sucks we don't have any inside information but i did want to you know a lot of questions came up on that video like how do we mitigate a ddos attack and things like that um so we thought we'd just clarify how that works how some of it works ray's gonna share his expertise on it um but you know in full disclosure we are a active customer of rays we were using ray b4 i've been on his channel tech bar which by the way i will leave it down below and uh some array staff has a problem with me because uh he made them do some hot sauce [Laughter] that was unfair you had an unfair advantage yes i was chewing shawn was chewing and you didn't tell us not to chew that would have made all the difference so if you're wondering about a hot sauce video we'll i'll leave a link to the tech bar i was on uh and of course you can find all the other tech bar episodes it's a lot of fun if you want to hang out with ray in them but also the hot sauce video and things like that so we've been working with rae for a while and ray is a little bit different what they offer at oit voip they are a full service as i would call them company where they do full deployment and everything else they aren't just a sip company uh but they jumped in to help us because well the situation sucks and it's you know we're not gonna throw uh voip ms under the bus or anything like that we just don't know what's going on there outside of we know as much as you the audience knows of whatever's been posted on twitter and we're not here to arm share it but i thought i would do the clarification of exactly like how to mitigate it and ray was kind enough not only to come out here and talk about it but go a step further and uh he used my favorite program and draw and he drew some cool graphs so we'll talk about that mitigation and clear things up related to that it's uh a little bit more in depth because when you take a mitigation from something like cloudflare or put something on a high-powered content delivery network when you're backing up a website well that's easy it's static content and if you know if my website was being attacked i could throw it up on cloudflare and replicate my website and my static content would be delivered but that doesn't really work with a voice phone call does it right no not at all and that that's the problem with real-time communications because anytime you add anything else in the mix you have latency so while like voipims now has cloudflare in front of the web portals and it'll ask you if you're human and all that stuff you can't really do that with a phone call so it's much more complicated yeah there's a there's a just a lot of confusion it's because whenever you're managing real-time applications so from what you learn here today you can also extrapolate this out to really any type of real type application service a lot of these things apply uh to it if you have something that needs that back and forth communication you can't just statically put something in front of it we're gonna keep it focused on voip because that's uh we'll raise a long time network engineer but currently president of oit voip says a lot of where his expertise is but he understands this deeply i understand that it can't be done but ray's going to tell you how it can be done so where do you want to start right you want to start with the graph or you just want to talk about some of the services um no i just i want to talk about like some of the ideas and the concepts that go beyond first before we get deep dive into the graph like okay and just so my background my background is in complex and distributed networking that's what i've been building for 20 years so multi-city multi-site multi-continent those are the networks i've built my entire life that's what i love doing um but like you said like when it comes to real-time applications voice uh video any time of that you know real-time messaging that's much much much more complicated and you know one of the reasons i was excited to get on a video with you is because there's so many misconceptions going on right now of like and people asking questions what can i do what options why don't they just do this why don't they just do that right and again not not just voip mms i want to be really clear it's just like a breach it's just like ransomware it could happen to anyone right this is just they got hit it really you know it's really unfortunate and our sympathies go out um but with all the people that are affected the questions they have we want to go over what really happens the way uh what really happens when the stuff happens and what what options are available to them um i also want to comment that a lot of this is referred to as mitigations and that's well the reason that words used as opposed to this solves the problem magically which if anyone tells you that just throw them out the door march that sales person right back out the door um the reason they use mitigation is because you're mitigating some of the problems but you're not absolutely if the pipe is big enough you can get taken offline i remember i think it was brian krebs a couple years ago uh someone really hated him and he was getting one of the largest ddos ever attacked against a single individual he said he set some records when they were trying to uh mitigate it and even though he had cloudflare cloudfair i think passed them off to google to avoid it so um any one of these or it is a scalability problem and as more of these people won't patch stupid things on the internet uh the botnets get bigger and more powerful and toasters are gonna be the destruction of the internet so we don't we don't know the numbers behind uh voip ms but um you were bringing up the one for the uk right what was the number you said for their throughput or 50 gigs and i that was quoted by steve gibson on the last episode of security now where he talked about the voip mess attack in the previous episode he had mentioned how big the meris spotnet was i don't know if those are coincidental things that he announced one week the biggest spot network of course bleeping computer did as well and then the next week we're talking about a large-scale attack on different voip providers and i i i don't you know we don't know until the only people know who's on the receiving of this is the people receiving it um but either way these these botnets are dangerous and uh they can knock companies offline which is what brought us to this conversation and that's the thing right like when you're scaling out your you know purchasing a firewall and you know you're talking about throughput for your ids ips or whatever other filtering you're doing they have limits to what they can handle and so when you think about you know that's the thing that comes up now in msp world where you know you have multi-gig available to you at a client site nowadays it's not that uncommon but go find a firewall that can actually filter in real time that kind of throughput right now when you say even when you get a data center you know we may get a 10 gig a couple 10 gig pipes or multiple you know or or even a 40 gig most of the connections that most providers are using is 10 gig at 40 gig and a good day so when you say 450 gigs of throughput you gotta imagine the kind of equipment required to just to be able to filter that and that's where that's what we'll get into on the diagram which keep in mind that kind of what's happening with the ddos is it's just bombarding your equipment where it can't do anything because it's stuck you know yeah the mitigations are i would absorb it essentially yeah exactly and so and just like anything else you know when you have real-time filtering and if you do email filtering for example right a lot of the email filter providers they receive the email first they examine it see what it is and then if it passes their test then they pass it over to you that prevents that presents latency right whether the email gets you a minute or two later or whatever it is and that's the problem with voip you can't really do that with voip because you know you can't the conversation will be delayed and the user will notice we have milliseconds to respond to anything to give you an idea good voip is under 100 milliseconds uh their acceptable voip is under 100 milliseconds good voip is under 30 milliseconds so every little fraction of a second really makes a difference when you're talking to somebody um but if you want to pull up the the uh diagram says first i want to go to go over how does voip actually work right because like there's something yeah there's some confusion there and so at its core it's pretty simple you have your phones and they'll register over to whatever voip provider you're using right and they may have multiple locations around the world and that kind of stuff that's pretty common and you're going to want to pick the one that's closest to you again to avoid that latency right and then they'll do their call processing and all that stuff all inside here and then when you're gonna call somebody that's outside of their network right because on that if you're calling another customer on the same network it'll stay there but if you're gonna call somebody that's you know calling a cell phone calling something like that that'll go over to what's called the public switch telephone network um the pstn is what we'll call it um and those connections more often than not are happening over the internet too right most of the most of the selects the competitive local exchange carriers the people that actually own the phone numbers um they have inter they're on the internet just like everybody else and they may have private connections public connections but they're going to have their connections out to uh to these providers and they're going over network resources it's ip transit just like anything else um so as you can imagine every one of these uh in the voip world they're called switches in the telco world they're called switches a switch is something that's actually switching uh calls from one resource to another adding in applications like your auto attendant your call cue your music on hold so these soft switches that are processing the calls you're connecting to that over and of course you're gonna have their routers or whatever they have here and then traffic's going to get there and they're going to do their job and send it off no big deal but what's happening is in the with the ddos attacks is you have all these other people doing the exact same thing right you have all these other agents sending traffic to the same routers congesting the path and you know where they may have a couple one gig pipes a couple 10 gig pipes or whatever it is there's these guys you know would take the uk for one because that's the only one we have the real numbers for they're sending 450 gigs of traffic through and even if that was split out to 45 gigs per pop or whatever you want to call it it's saturating it the rest of your calls can't get through now remember what i said you have it's that the carriers that are you know the public switch telephone network to get out to dial a cell phone dial uh you know somebody else's line on another phone provider they're also using those same internet connections to the same soft switches so if the call can't get if you can't connect to it they also can't connect to the pstn now there's other strategies i want to be clear you can have private separate links right like if you're building a san you're going to have different network internet connections or different network adapters for the data separate for the storage separate for the compute you're going to have different things and there are strategies like that for voip i'm just talking about this general because i don't want to get really you know into the weeds on it um but at the end of the day it's this it's these connections here these giant traffic uh these giant blobs of traffic are just clogging the pipes for lack of a better word and none of the traffic can get out so when people start saying well can't they just forward my number well how can they forward the number if the call switching the call routing that happens here they can't change anything because it can't send the traffic it needs out to the pstn if they can't say okay well and what a common strategy would be is you know take this phone that's going over here to pop3 move them over to pop2 but if you saw tom's last video where he brought up all the pops and you know those public ip addresses are very easy to find it's not and what's happening with the current attack is they're just rolling through the different pops and they're just you know they're taking one out and then they're moving to the next one they're moving to the next one so you may have good traffic going on at that point in time and an hour later you're sl you're slammed again yeah it appears to be kind of like a rolling attack across where people say it's up it's down and i'd seen people showing different plots and things like that it's kind of maybe they don't have enough bandwidth to attack one because they have certain mitigation that can absorb x number of connections per second but that's why they roll it now between different ones because you're still disrupting the service and they probably do it based on time zone like you know they know that these ones are more busy in the eastern time and these ones are more busy in pacific time whatever they can do to cause the most pain whoever's doing this that's their goal is to create pain well and they're very smart about it right like we saw that um with the big you know msp hack that happened uh over fourth of july weekend they were planning to do it over the weekend because they knew it was gonna you know people were gonna be off nobody was gonna be working that monday or whatever it was it just happened to go early you know and so these these attackers are very very smart and i agree with you i think they're looking at time zones they're looking at the most active times they're doing this and again we don't have any inside we haven't contacted any of it's pure speculative but it is to me it's clear this is being done to make to cause pain this is being done in the way that is the most destructive method possible this is not a you know oops we we took over your your oil pipe by mistake we really didn't mean to my bad this is a this is absolutely a directed attack um and like i said it could happen to anybody you know what i mean it's just you know and that's what you you want to be careful with but there's mitigation strategies right like that's what the people really want to know that what can i do about this um so with the mitigation strategies as much as i'm i'm sure tom and i would like to get really really really technical about it it's not as complicated as you think it is basically putting a referee in front it's saying it's having the referee say no i'm going to scrub all the traffic and that's what they're called they're called scrubbers and they're these i should probably bring that up front um they're these giant big iron routers with these multi-100 gig or bigger connections aggregated with these ridiculously fast asics with the sole job of identify the traffic filter out the bad traffic let the good traffic pass and so when it comes to the voip world the common strategy is um instead of having these what are called pops these points of presence uh whether it's the soft switch whether it's their routers whatever it is instead of having them directly exposed to the clients right as we had here the phone registers directly to pop what will happen here is the traffic will go through the scrubber and the scrubber will say this is good traffic this is bad traffic it'll identify it'll put stuff on rbls it'll black hole routes once it identifies okay well ip1.1 ip1.1.1.0 let me use a real-life address there you go yeah it's just dns whatever um they can handle it right right um so but what will happen is okay they'll identify this traffic's coming in it looks to be malicious it's from this ip address we've also seen the traffic from all these others because these are all working in tandem and when i show three i'm these companies that do this there's really big companies that do this there's uh arbor we talked about netscout owns them uh path.net carrera cloudflare is the biggest most common one now clydeford doesn't do voip that's why we're not talking about in this context but these giant enormous scrubbers they're talking to each other as well so there's this orchestration that says okay well scrubber one identified traffic from here that's bad let me take that same ip list or let me take that same asn or let me take that same prefix and i'm now going to tell scrubber three or scrubber two give them the data so they can also proactively block it and they get faster and faster and faster and that learning period and that scrubbing period that's why we call it mitigation we can't do this all the time um because now imagine you're passing traffic over to the scrubber then over to your voip network and the reason voip providers like myself have so many of these pops is we want to be as close to you as possible and anytime you introduce an extra data center an extra hop you're going to introduce some latency and you know the potential for any kind of route congestion any kind of anything else that could happen but what happens is you know these things are ridiculously good at what they do especially the ones that are designed for voip they'll scrub the traffic and instead of having these devices these soft switches on the public internet will have gre tunnels typically um jerry tunnels which is basically it's an encapsulation thing it's basically like vpn but different um but it will establish i'm going to do a video clip around gre because if people ask about it i want to do a video on it because there's some good use cases for it like this oh absolutely yeah absolutely right um it doesn't provide the encryption but it does provide the encapsulation and a lot of times you can combine ipsec with jerry but that's a whole that's a different i'm looking forward to that video yeah yeah yes yes so we'll have established gre tunnels and so what will happen we may be hitting that 450 over here but all that's really being passed over here is the good traffic so maybe that 10 gig or that one gig or five gigs or whatever is coming through and then they're able to go out to the pstn and they may have a private connection back to it to the pstn carriers or they may have another gre connection or even if they're just going back out to the scrubber to go back out to the pstn not a big deal because the scrubber's cleaning all the work for you it's your security guard and it makes life a lot easier um i hope that was as clear as clear as much you know what i think it makes a lot of sense you know the data coming in and the other thing too is uh as you do this the learning period that these go through uh and they build these black lists like how they are identifying things as i mentioned earlier like the marist.net um those are a bunch of uh specifically microtech devices make up that particular botnet and the goal is to collect all those addresses because these are usually sold on static addresses and these are fairly powerful devices the maker take have a relatively good processor so it allows them a lot of attack and as you said the collectors are doing all the collection and burning that so once those uh things have collected and learned all the bad ip addresses the only thing left is the good ip address is coming from clients now hopefully they're not one in the same hopefully the client's not part of the botnet but i bet that happens that's probably fun you're like hey by the way your stickers happen once or twice yeah you're sitting behind one of these infected devices that's doing the attacking that's a weird coincidence right but yeah and then you get that email from your isp saying hey we notice you have port 25 open and sending traffic or you're doing a dns reflection yeah bad stuff and and what happens with the clients i i thought i should bring this up real quick um what happens with the clients the reason all this can happen in the background the clients actually don't have to worry about registering to a new place is because and this is where you have to have some preparation uh this is not just something you can do on the fly um you know voip providers such as myself we do plan this stuff out just like you know whether it's an ir strategy for anything else you have to have your plans for this and what will happen is we will have we will use bgp and um these scrubbers or these ddos mitigations will start announcing our prefixes so when you go and you resolve pop1.wipe.network what will happen is instead of resolving over here it'll resolve to an ip address and that ip address instead of routing over here it'll route over here that way they're getting the traffic we're not telling the user hey now you need to register to pop2 instead or pop3 it's completely transparent to the user um and that's just built into the way the internet works thank you bgp and all that fun stuff yeah and essentially what's going on here is you can slide these in with the bgp router announcement so you you prepared this you know what the route announcement is to put these in you know what the route announcement is take them out and as you said in the beginning to keep the voice latency at the absolute optimal which voip is kind of unique in this when you're thinking about your presence voip always has to have almost like a city level wherever they have a lot of customers you end up with one of your points of presence being there to keep the latency at the absolute lowest and you don't leave this turned on all the time because once again you want to keep the latency at the absolute lowest but this is really where the planning comes in phase to make sure that well we see it happening guys flip the switch and do a bgp router announcement if you dig around on my channel i covered the verizon do you remember the verizon pittsburgh uh incident yeah yeah i covered how that happened and to cover a little bit of how bgp route announcements go wrong and it happens too all the time where like somebody else will announce the wrong route or you know when you're announcing you're announcing routes they may announce a prefix that didn't belong to them yeah and so stuff will start getting routed through croatia or through whatever else yeah um does that tax but yes it can just yeah we could get a whole other topic and i could bring some more people we should have like a bgp roundtable would be fun because i have some friends i've learned a lot from them man i'm not i don't even i'm not the bgp expert but i i'm talking at them they're pulling their hair on a regular basis um but nonetheless it's gotten much better than it was a couple years ago and once you have this in place you flip the switch the bgp router announcement about how long do they take from from i see something going on and you flip the switch what's the time frame you're looking at ray from uh these not installed bring these in so the announcements you can do them as quick as 60 seconds um it is very very fast as long as you have everything prepared in advance right they need to know where your ip or what your prefixes are which your subnets they need to know what you have they need to know uh who you're peering with they need to know what the acceptable traffic is what the data centers are using you have to have the gre tunnels ready to go um those gre tunnels typically stay live 24 7. um the difference is we're just not routing traffic through them until something bad happens and this is not really different from how an isp handles things either it's not uncommon for them to take an uh taken a subnet and instead of announcing it in their cleveland data center they'll announce it in their you know dayton data center it happens very very often um the difference is with voip we don't move things around nearly as often just because you know we want things to stay nice and stable and it's you know if your google.com takes a little longer to refresh you're not going to notice um if your phone call gets choppy you are absolutely going to notice so we're going to get a phone call or a nasty email or something yeah so exactly all right so we got this part covered now what's next so one of the things that um i kept seeing online right and i know we talked about this both of us kept saying this is well why can't i'm just going to get a backup sip provider right i'm just going to get a backup voip provider right that way i don't lose my phone calls which okay this is one of those things that maybe right it and it doesn't really work that way because what will happen is just like um and i don't i don't want to get super deep dive into this but just like ip addresses have their bgp routes that are which are how you find the eip addresses and just like dns you'll look for dns and dns fully resolved ip addresses dids phone numbers right and the north america numbering plan is 10 digits right area code exchange and then the last four so what will happen is those phone numbers have what's called an lrn uh uh it's a routing number and they're and when you look for i'm gonna call tom and you know one one one one one one one one um what's gonna happen is we'll do a lookup we'll say okay well what rate center does that belong to it equates to this lrn belongs to this rate center this rate center is currently pointed to verizon let's call it right um so and then verizon being the sip provider for you will send the call to you you cannot move that number you can't say okay this number is now going to be on you know bob's telco without a porting process where that basically it's telling the lrn to now point to bob's telco instead of verizon so when you go through porting you're moving carriers that's what happens um if you had a second voip provider say you had verizon and you had bob's telco you can't get your phone number to just magically come through bob's telco if bo if verizon's getting slammed that number's not going to work you can get a second sip provider for doing outbound right that's not a big deal you can absolutely send the call out that's not going to help you with people trying to get a hold of you so if you wanted to say hey this is my temp number you know call me on this number we can still receive to the office you could do that it's not much better than just saying here's my cell phone number you know honestly it's what i would do um and now i'm only saying that that's only for local phone numbers um so toll-free numbers are a little bit different toll-free numbers are a lot like bgp a lot like dns and that toll-free you can actually modify uh modify their route every five minutes um which is why you know we got very lucky when we were helping you guys out and and moving your numbers we happen to have a lot of the relationships on the back end with the same underlying carriers so we're able to move the numbers the same day um but with toll-free that's always the case toll-free you can move it like that that's actually one of the benefits of toll-free why it's sold to enterprises is because they can load balance calls on toll-free and they can actually migrate them to where it's most cost advantageous for them or where it's more advantageous for them because of any kind of provider outage or anything like that it's actually one of the really cool things about toll free it's one of the reasons we liked it years ago and i worked in uh enterprise with that so one of the reasons we set the toll free was because uh we had some call capacity issues that we run into and that's how we would mitigate those and solve them yeah it's it's weird because dids local numbers right did's direct inward dial but it's the common name for local numbers they'll be tied to one provider with toll-free numbers especially in the enterprise space and the market when you're in the marketing sales space it's not uncommon for a toll-free number to hit multiple carriers at the same time that's actually pretty typical it's one of the things a lot of people don't realize when you call out um we're actually trying multiple underlying carriers we're doing real-time calculations what is our lowest cost route what is the route that's going to have the least amount of um the least amount of hops or that's going to get the fastest connection and so like when you make a call and you hear it's a little bit quiet before it starts ringing that's called post style delay that's what the carrier is doing on the back end when they're seeing what's the best route to get there um and toll free you just have a lot more magic you can do it's just a lot easier that's cool all right do we cover all of it or is there something else we want to throw in here let's see here we talked about ddos we talked about voice applications we talked about real time uh we talked about second providers um toll free uh porting out um that is okay i i want to be really cautious about this about how i preface this because a lot of the providers thought mike and i'm i i have to save way ms here and i'm not calling him out i want to be clear on it but a lot of the people that i saw on the twitter feeds were saying i can't even port out because their services are down that's absolutely not true now i want to be clear i'm not saying when your carrier has a problem jump right jump ship right away in most cases porting out takes a couple days or a couple weeks so you know there's a negative return and they may fix it so i'm not trying to get anybody scared and saying you should pour it out immediately but the way porting works is there's a central repository um mpac is the one that's responsible for the phone numbers and the phone number routing when you say you know i want my numbers to be on tom's telco or bob's telco and so that company is completely outside of uh voip ms or anybody else um so that porting process does still work now you may need a copy of your bill which if you can't log in the portal if or you can't get a pin number or your you know that stuff is fine um even if they're so jammed up that they can't respond so because there is a timeline they have to respond to port out requests with the way the fcc is has set it up they don't get a pass to not respond to port out requests because they're having a ddos attack that's not the way that works the fcc truly and honestly doesn't care um so they do have their timelines they have to respond most scenario in most cases if they don't respond the number is going to pour it out automatically no matter what um so if you're in a position and again i want to be extremely clear i'm not saying telling everybody on voip a message jump ship it could happen to anybody right i'm sure they're working night and day to get it resolved that's not what i'm saying here but so you know what's available to you regardless of what whatever incident happens you always have the ability to port out no matter what um because i saw that come up over and over again and you know people were it's more about all of that process and making sure people are clear that you can do that and this is actually one of those questions that's come up before um and once again because i i did some um my first phone system i worked on was in 99 on nortel systems and things like that but so they're probably still running they didn't they never die but um they turn yellow but they don't die yeah all they do is kind of get that weird yellow patina but they uh nonetheless the one thing that has come up for us like well what if you're with this company and they go defunct or whatever you can still get your number back out because that's actually happened over the years um maybe one day me and ray will talk some more stories i have a crazy one about being involved in a voice company around circa 2005 one of the big voip companies that started up and fell apart because of some funding problems but anyways you can get all your numbers back out of it um it kind of it defaults let's say that company any company just doesn't respond for reasons unknown eventually if it's kind of like fail over to the inbound porting where the request came from correct so that's how it works the yeah the the local number reporting act local portability act local number portability act i'm sorry you're gonna have to edit that we're doing our best to not have to edit anything yeah um the the local number portability act is very clear in most cases there are very few there are a handful of exceptions but in most cases the user of the phone number has the right to move it anywhere else they want i'm not saying they are the owner of the number the owner of the number is a whole different thing that belongs to the rate center that belongs to the spin that's assigned by by npac but the user of the number has the right to move it however they want to wherever they want and in most cases as long as there's you know it's not some ultra rural telco that doesn't have ssn ss7 interchange or whatever in most cases they can migrate the number and it's not a big deal um so you always have that available to you yep so hopefully this cleared up all the questions and now this will be the video i reply with for all the uh cloudflare people that just just use cloudflare which drives me nuts it's an oversimplification of a very complicated problem you've seen cloudflare respond back on twitter and they'll say now we have voip service so yeah and make this whole video wrong because they'll they could do the same thing but all these complicated lines this shows the complexity of it that's why you can't just say use cloudflare there's a little bit more to it than that and that's what we wanted to share with you um that's why i have rayon here uh but me and ray are probably gonna do some future videos together as well but i i'll leave all the links to uh oit voip and uh me eating hassa rae and suffering a little and poor simon i have gone back and had a few more pieces with my family obviously there was you know it was at a family event and there was good drinking involved to to build up the courage to have that again uh we're not at tom level where you can just i don't know how you pound it down man it is impressive on this little memory card is the one chip challenge i have to edit that still we did it here at the office i don't recommend it we we ended up employees like we had to clear the calendar it was bad it was rough for us i was watching a tick tock where they were talking about how to make your own chip uh seasoning and stuff like that so when are we gonna see like tom's like fiery chip sauce or like you know what i mean like when are we gonna see your kettle chips like i can only imagine how bad that would be at some point we may we may go there but nonetheless all right links down below to some of the things i reference like uh of course everything that raided and uh if you want to listen that grc episode uh by steve gibson he covers it and um some of the other bleeping computer articles i mentioned make sure we cite all the sources where we have this information from there's always more reading to do i don't want you just to watch this video and say this is it there's always more and it's a rabbit hole and we've read all these articles to get to where we are so we can share the knowledge of you and uh thank you all for joining us here and uh thank you ray for coming on and helping us out here and big thanks because my phone's ringing again you're welcome and i'm sorry thanks for having me on tom once you fix it man we were like oh crap just ding me man i would like to know how was that first person that first phone call you answered like were they like surprised that the phone was ringing like how excited were they like they won the lottery right i answered some of them because they were ringing so much you know i was like i guess i gotta help now sounds good man well until the next one yep all right thanks and thank you for making it to the end of this video if you enjoyed this content please give it a thumbs up if you'd like to see more content from this channel hit the subscribe button and the bell icon to hire a short project head over to lawrences.com and click on the hire us button right at the top to help this channel out in other ways there is a join button here for youtube and a patreon page where your support is greatly appreciated for deals discounts and offers check out our affiliate links in the descriptions of all of our videos including a link to our shirt store where we have a wide variety of shirts and new designs come out well randomly so check back frequently and finally our forums forums.lawrencesystems.com is where you can have a more in-depth discussion about this video and other tech topics covered on this channel thank you again and we look forward to hearing from you in the meantime check out some of our other videos you
Info
Channel: Lawrence Systems
Views: 12,300
Rating: 4.9634705 out of 5
Keywords: LawrenceSystems, distributed denial of service, information security, distributed denial of service (ddos), cyber security, distributed denial of service attack, voip ddos, voip ddos mitigation, information security tutorial, distributed denial-of-service (ddos) attacks
Id: XsTAXVRcEto
Channel Id: undefined
Length: 35min 35sec (2135 seconds)
Published: Sat Sep 25 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.