Software Program Offers Full-On Attacks on Target Servers

The Internet Patrol - Patrolling the Internet for You

You can share this, including by text message!

  • Software Program Offers Full-On Attacks on Target Servers


And you thought that Lycos’ “Make Love Not Spam” screensaver was bad (or good, depending on how you looked at it).

A company called Symbiot has developed a software package which is ostensibly designed to protect your system from attacks…by mounting a good offense qua defense.

Using a process which it calls “Graduated Response”, the software first attempts to block the attacking packets, or deflect them to another target (that sounds abuseable, doesn’t it?), or simulate a response to throw the attacker off the track.

So far, so good.

But listen to this. If the system deems that more drastic measures are needed, it can move to full-on attack mode itself, including such measure as, and Aunty is quoting here:


Invasive Techniques – obtaining access privileges on the attacker’s system, and then pursuing a strategy of disabling, destroying, or seizing control over the attacking assets.

Symmetric Counterstrike – sending exploits and other attacks which are specific to vulnerabilities on the attacker’s system, in an amount proportional to their current attacks.

(Article continues below)
Get notified of new Internet Patrol articles for free!
Or Read Internet Patrol Articles Right in Your Inbox!
as Soon as They are Published! Only $1 a Month!

Imagine being able to read full articles right in your email, or on your phone, without ever having to click through to the website unless you want to! Just $1 a month and you can cancel at any time!
Software Program Offers Full-On Attacks on Target Servers

Asymmetric Counterstrike – preemptive measures in response to distributed attacks orchestrated by a known source. This retaliation could be far in excess of the attack that the aggressor has underway.”

There isn’t a measure there which Aunty would consider legally sound, no matter what you think of the ethics or morality of the measures. Even Symbiot itself says that it is “continually evaluating the legal aspects of these more aggressive countermeasures in coordination with law enforcement agencies at various levels. While we believe that our iSIMS attacker profiling, reconnaissance and identification products allow quantified evaluation of attacker identities, we stress that our customers should obtain appropriate advice and information to make decisions that will not violate applicable laws.”

Funny, though, Aunty doesn’t see any customer indemnification warranty anywhere on their site.

Still, it would have been kind of fun to see what would have happened if Graduated Response had met Make Love Not Spam.


You can read more about this at the [Page no longer available – we have linked to the version instead].

No Paywall Here!
The Internet Patrol is and always has been free. We don't hide our articles behind a paywall, or restrict the number of articles you can read in a month if you don't give us money. That said, it does cost us money to run the site, so if something you read here was helpful or useful, won't you consider donating something to help keep the Internet Patrol free? Thank you!

Software Program Offers Full-On Attacks on Target Servers

Get notified of new Internet Patrol articles!

You can share this, including by text message!

  • Software Program Offers Full-On Attacks on Target Servers

One thought on “Software Program Offers Full-On Attacks on Target Servers

  1. Unfortunately, the majority of computers used in DDOS are owned by people who have no concept of what computer security is all about. Because they leave their computer on line 24-7 and donot have the basic protection ie: a firewall, antivirus malware prgs their computer is easily cloned and used to attack other computers.
    By counter attacking the wrong culprit the prg will actually cause even more problems.
    Not a very well thought out solution. IMO the company should address the real problem and help educate the growing number of computer illiterate people as to the basics of computer security.

Leave a Reply

Your email address will not be published. Required fields are marked *