DOS Attacks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Stracheldracht

-combines Trinoo with TFN -detects source address forgery -performs a variety of attacks

What are the two forms of DOS Attacks?

1. Crash a server 2. Floods a service

DDOS

A DOS attack that is distributed over large group of computers. To perform, attackers use a zombie network: a group of infected computers on which the attacker has silently installed the DOS tool. A server system is being flooded from fake requests coming from multiple sources. Hackers use a Trojan to create the zombie network.

SYN flood

A form of DOS attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make to system unresponsive to legitimate traffic.

Protocol DDOS attack

A protocol DDOS attack is a DOS attack on the protocol level: Synflood and Ping of Death

Tor

A software and an open network that helps you defend against traffic analysis. A form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

UDP(User Datagram Protocol)

A transport layer protocol defined for use with the IP network layer protocol

Clean Pipes

All traffic is passed through a cleaning center, where various methods are performed to filter back traffic. Tata Communications, Verisign, AT&T are the main providers of this kind of protection

What is a DOS Attack?

An attempt to make a system or server unavailable for legitimate users and, finally, to take the service down.

ICMP(Internet Control Message Protocol)

An error-reporting protocol network device like routers used to generate error messages to the source IP address when the network problems prevent delivery of IP

DAVOSET

Another nice tool for DDOS attacks.

Three types of DDOS attacks

Application-layer DDOS attack Protocol DOS attack Volume-based DDOS attack

Application Layer DDOS

Attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to attack and crash the server.

Methods of Prevention: Stack Tweaking

Complex method Alters TCP stack Makes attack difficult but not impossible

How to defend Against DOS Attacks:

Configure firewall to-->filter out incoming ICMP packets, egress filter for ICMP packets, disallow any incoming traffic Use tools such as NetStat. Disallow traffic not originating within the network Disable all IP broadcasts Filter for external and internal IP addresses Keep AV signatures updated Keep OS and software patches current Have an acceptable use policy

Blackholing

Detects the fake attacking traffic and sends it to a black hole

Echo/Chargen Attack

Echo service sends back whatever it receives Chargen is a character generator. Combined, huge amounts of data to form an endless loop.

ICMP Flood Attack

Floods-Broadcasts of pings or UDP packets Nukes-Exploit known bugs in operating systems

GoldenEye HTTP Denial of Service Tool

GoldenEye is developed in Python for testing DOS attacks but people use it as a hacking tool.

Protection against Smurf attacks

Guard against Trojans Have adequate AV software Utilize proxy servers Ensure routers don't forward ICMP broadcasts

HULK(HTTP Unbearable Load King)

HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. It has a list of known user agents to use randomly with requests. It also uses referrer forgery and it can bypass caching engines, thus it directly hits the server's resource pool. The developer of the tool tested it on an IIS 7 web server with 4 GB RAM. This tool brought the server down in under one minute.

UDP Flood Attack

Hacker sends UDP packets to a random port, generates illegitimate UDP packets, causes system to tie up resources sending back packets

Teardrop Attack

Hacker sends a fragmented message Victim system attempts to reconstruct message Causes system to halt or crash

Smurf IP attack

Hacker sends out ICMP broadcast with spoofed source IP -intermediaries respond with replies -ICMP echo replies flood victim -the network performs a DDOS on itself

TCP SYN Flood Attack

Hacker sends out a SYN packet Receiver must hold space in buffer Bogus SYNs overflow buffer

Volume-based DDOS attack

ICMP floods, UDP floods, and other kinds of floods performed via spoofed packets.

Real World Examples of DDOS attacks

MyDoom and Slammer

DDOSIM- Layer 7 DDOS Simulator

Performs DDOS attacks by simulating several zombie hosts. Tool is written in C++ and runs on Linux systems -zombie attacks -random IP addresses -TCP-connection-based attacks -application-layer DDOS attacks -HTTP DDOS with valid/invalid requests -SMTP DDOS -TCP connection flood on random port

XOIC

Performs a DOS attack at any server with an IP address, a user-selected port, and a user-selected protocol. Comes with 3 methods: Test mode, normal DOS attack mode, DOS attack mode with a TCP/HTTP/UDP/ICMP message.

Sinkholing

Routes all traffic to a valid IP address where traffic is analyzed, it rejects back packets.

Methods of Prevention SYN cookies

SYN cookies: initially no buffer is created Client response is verified using a cookie only then is the buffer is created resource-intensive

Ping of Death

Sending a malformed malicious ping to a computer. Deliberately sending an IP packet larger than 65,536 bytes.

Methods of Prevention: RST cookies

Sends a false SYNACK back Should receive an RST in reply Verifies that the host is legitimate *not compatible with Windows 95

Land Attack

Simple attack Hacker sends packet with the same source and destination IP System "hangs" attempting to send and receive message

Tor's Hammer

Slow post tool written in Python. It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.

Common Tools Used for DOS

TFN and TFN2K -perform various protocol floods -master controls agents -agents flood designated targets -communications are encrypted -communications can be hidden in traffic -master can spoof its IP

How is a DOS Attack achieved?

This is achieved by flooding the server's request queue with fake requests. After this, server will not be able to handle the requests of legitimate users.

LOIC(Low Orbit Ion Canon)

Tool performs a DOS attack by sending UDP, TCP, or HTTP requests to the victim server. Used by a single user to perform a DOS attack on small severs. All you need is the URL of the IP address of the server.

OWASP DOS HTTP POST

Tool to check if web server is able to defend DOS attacks or not. Also can be used perform DOS attacks against a website.

PyLoris

Utilizes SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols including HTTP, FTP, SMTP, IMAP, and Telnet.

R-U-Dead-Yet (RUDY)

performs a DOS attack with a long form field submission via the POST method


Ensembles d'études connexes

Astronomy Final- Jerome Fang OCC

View Set

Quiz #5: Sections- Introduction, 5.1, 5.2

View Set

Switching, Routing, and Wireless Essentials chapters 14-16

View Set

Chapter 7: Types of Business Ownership

View Set

A&P - Exam 1 Study Material on Modules 1-4

View Set