SlideShare a Scribd company logo
1 of 95
Download to read offline
© AKAMAI - EDGE 2016
Barbarians at the Gate(way)
Dave Lewis, Global Security Advocate
© AKAMAI - EDGE 2016
Text
#whoami
Dave Lewis
@gattaca
dave@akamai.com
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
We Found Him!
© AKAMAI - EDGE 2016
Text
å
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
It left me wanting…
© AKAMAI - EDGE 2016
Text
Game Plan
• Actors
• Attacks
• Tools
• Trends
• Data
• Now what?
© AKAMAI - EDGE 2016
Text
Actors: For Hire
© AKAMAI - EDGE 2016
Text
Current(ish) prices on the Russian underground
• Hacking corporate mailbox: $500
• Winlocker ransomware: $10-20
• Intelligent exploit bundle: $10-$3,000
• Hiring a DDoS attack: $30-$70/day, $1,200/month
• Botnet: $200 for 2,000 bots
• DDoS botnet: $700
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Actors: Bored Kids
© AKAMAI - EDGE 2016
Text
Bored Teens
https://www.flickr.com/photos/ardinhasaphotography/8484164608/sizes/l
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Hacktivists
https://www.flickr.com/photos/sklathill/2255718951/sizes/l
© AKAMAI - EDGE 2016
Text
Actors: Nation States
© AKAMAI - EDGE 2016
Text
Standard Villains
There are
© AKAMAI - EDGE 2016
Text
Arch Villains
And there are…
© AKAMAI - EDGE 2016
Text
Attacks
© AKAMAI - EDGE 2016
Text
Attack Vectors Over HTTP
© AKAMAI - EDGE 2016
Text
Attack Vectors Over HTTPS
© AKAMAI - EDGE 2016
Text
Types of Attacks
SYN Floods
UDP Floods
ICMP Floods
NTP Amplification
HTTP Flood
© AKAMAI - EDGE 2016
Text
Attacks: Volumetric
© AKAMAI - EDGE 2016
Text
Your website can be overwhelmed…
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Attacks: Application Layer
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Application Layer DDoS
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Attacks: Extortion
© AKAMAI - EDGE 2016
Text
DD4BC
Began by targeting sites with ransom demands
Failure to pay lead to increased $$$ to stop the attack
Earlier attacks focused on businesses that would avoid
reporting the attacks to law enforcement.
Once research published they relocated their campaigns to
APAC
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
More recently…
• DD4BC continues to inform victims that they will
launch a DDoS attack of 400-500 Gbps against
them.
• To date, DD4BC attack campaigns mitigated by
Akamai have not exceeded 50 Gbps in size.
• That’s up from the high of 15-20 Gbps observed
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Attacks: Amplification
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Tools
© AKAMAI - EDGE 2016
Text
Tools: Havij
© AKAMAI - EDGE 2016
Text
Tools: Donut
© AKAMAI - EDGE 2016
Text
Tools: Donut (con’t)
GET / HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg,
application/x-shockwave-flash, application/msword,
application/vnd.ms-powerpoint, application/vnd.ms-excel, */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
5.1; .NET CLR 1.0.3705)
Host: www.foo.bar
Connection: Close
© AKAMAI - EDGE 2016
Text
Tools: HULK
© AKAMAI - EDGE 2016
Text
Tools: HULK (con’t)
GET /?NJB=VURZQ HTTP/1.1
Accept-Encoding: identity
Host: www.foo.bar
Keep-Alive: 112
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3)
Gecko/20090913 Firefox/3.5.3
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Connection: close
Referer: http://www.foo.bar
Cache-Control: no-cache
© AKAMAI - EDGE 2016
Text
Tools: LOIC
© AKAMAI - EDGE 2016
Text
Tools: HOIC
© AKAMAI - EDGE 2016
Text
Tools: Brobot
Brobot is a PHP trojan that allows an attacker
to take control of a victim's compromised hosted
Web server and use it to launch DDOS attacks.
© AKAMAI - EDGE 2016
Text
Tools: SSHowDown
CVE-2004-1653
© AKAMAI - EDGE 2016
Text
Tools: Mirai
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Tools: WGET
© AKAMAI - EDGE 2016
Text
Trends
© AKAMAI - EDGE 2016
Text
Media Grandstanding
© AKAMAI - EDGE 2016
Text
Commoditization of DDoS
https://www.flickr.com/photos/trophygeek/7309935684/sizes/l
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
What’s your fancy?
© AKAMAI - EDGE 2016
Text
What’s a Booter?
https://www.flickr.com/photos/chicagobart/4480217217/sizes/l
© AKAMAI - EDGE 2016
Text
OK, What’s a Stresser?
Image Credit: Honda
© AKAMAI - EDGE 2016
Text
Stressers or Booters
• xBOOT
• Flash Stresser
• Hyper Stresser
• Grim Booter
• Anonymous Stresser
• Titanium Stresser / Lizards
• Big Bang Booter…and so on.
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Some other highlights
• DDoS agents targeting Joomla and other SaaS apps
• A heap-based buffer overflow vulnerability in Linux systems
• Attackers using new MS SQL reflection techniques
• Data breaches fueling login attacks
© AKAMAI - EDGE 2016
Text
OK so, attribution?
https://www.flickr.com/photos/45909111@N00/8519280338/sizes/l
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
MEGA MEGA MEGA
These large attacks all contained SYN floods
12:34:04.270528 IP X.X.X.X.54202 > Y.Y.Y.Y.80: Flags
[S], seq 1801649395:1801650365, win 64755, length 970
....E.....@...}.6.....6....Pkb......P...c.........................................
..........................<snip>..................................................
© AKAMAI - EDGE 2016
Text
DDoS: Function of Time
© AKAMAI - EDGE 2016
Text
Other Observations
• SQLi
• Local/Remote File Inclusion
• IoT botnets coming to the forefront
• PHP Injection
• Malicious File upload
• JAVA …best remote access platform ever!
© AKAMAI - EDGE 2016
Text
SQL Injection…still
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Why this is a problem
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Passwords
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
File Inclusions
© AKAMAI - EDGE 2016
Text
Malicious Uploads
• KCFinder file upload vulnerability
• Open Flash Chart file upload vulnerability (CVE-2009-4140)
• appRain CMF (uploadify.php) unrestricted file upload exploit (CVE-2012-
1153)
• FCKeditor file upload vulnerability (CVE-2008-6178)
© AKAMAI - EDGE 2016
Text
Undead Army
https://www.flickr.com/photos/scabeater/3272684874/sizes/o/
© AKAMAI - EDGE 2016
Text
So, what to do?
• I might know a vendor that could help :-)
• SQL INJECTION IS A SOLVABLE PROBLEM
• Harden systems
• Work with your ISP on mitigation strategies
• Use ACL lists to deal with known bad IPs
• IP Rate limiting
• PATCH PATCH PATCH
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
STATEOFTHEINTERNET.COM
© AKAMAI - EDGE 2016
Text
© AKAMAI - EDGE 2016
Text
Thanks!
© AKAMAI - EDGE 2016
Text
Thanks for listening!
© AKAMAI - EDGE 2016
Text
Questions?
Thanks
Dave Lewis
@gattaca
dave@akamai.com

More Related Content

What's hot

Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowakamaidevrel
 
Edge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your originEdge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your originakamaidevrel
 
Edge 2016 keeping tls secure
Edge 2016 keeping tls secureEdge 2016 keeping tls secure
Edge 2016 keeping tls secureakamaidevrel
 
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -Taisuke Yamada
 
Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018Cliff Crocker
 
Velocity spa faster_092116
Velocity spa faster_092116Velocity spa faster_092116
Velocity spa faster_092116Manuel Alvarez
 
Measuring what matters
Measuring what mattersMeasuring what matters
Measuring what mattersCliff Crocker
 
Progressive Web Apps. What, why and how
Progressive Web Apps. What, why and howProgressive Web Apps. What, why and how
Progressive Web Apps. What, why and howRiza Fahmi
 
A Modern Approach to Performance Monitoring
A Modern Approach to Performance MonitoringA Modern Approach to Performance Monitoring
A Modern Approach to Performance MonitoringCliff Crocker
 
MVVM for the Web
MVVM for the WebMVVM for the Web
MVVM for the WebExcella
 
Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)Guy Podjarny
 
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기Tae Young Kim
 
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...DevDay.org
 
DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015Desmond Tam
 
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services SingaporeKel
 
Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20CodeValue
 
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...Alexandra Anghel
 

What's hot (20)

Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is now
 
Edge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your originEdge 2016 acme - lets encrypt your origin
Edge 2016 acme - lets encrypt your origin
 
Edge 2016 keeping tls secure
Edge 2016 keeping tls secureEdge 2016 keeping tls secure
Edge 2016 keeping tls secure
 
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
ウェブサイト最適化101 - 正しく測ろうあなたのサイト -
 
Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018Measuring What Matters - Fluent Conf 2018
Measuring What Matters - Fluent Conf 2018
 
Velocity spa faster_092116
Velocity spa faster_092116Velocity spa faster_092116
Velocity spa faster_092116
 
Measuring what matters
Measuring what mattersMeasuring what matters
Measuring what matters
 
Progressive Web Apps. What, why and how
Progressive Web Apps. What, why and howProgressive Web Apps. What, why and how
Progressive Web Apps. What, why and how
 
Hacking Web Performance
Hacking Web Performance Hacking Web Performance
Hacking Web Performance
 
A Modern Approach to Performance Monitoring
A Modern Approach to Performance MonitoringA Modern Approach to Performance Monitoring
A Modern Approach to Performance Monitoring
 
Fluent 2018: Measuring What Matters
Fluent 2018: Measuring What MattersFluent 2018: Measuring What Matters
Fluent 2018: Measuring What Matters
 
MVVM for the Web
MVVM for the WebMVVM for the Web
MVVM for the Web
 
Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)Third party-performance (Airbnb Nerds, Nov 2013)
Third party-performance (Airbnb Nerds, Nov 2013)
 
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
On-premise를 이용하는 iot 서비스 aws 리-아키텍쳐 하기
 
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...[DevDay2018] Introduction to Cloud Computing and AWS platform  - By: Bach Huy...
[DevDay2018] Introduction to Cloud Computing and AWS platform - By: Bach Huy...
 
DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015DIY Website Performance - Akamai Toronto Tech Day 2015
DIY Website Performance - Akamai Toronto Tech Day 2015
 
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore2nd AMIMOTO: WordPress + Amazon Web Services Singapore
2nd AMIMOTO: WordPress + Amazon Web Services Singapore
 
Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20Vered Flis: Because performance matters! Architecture Next 20
Vered Flis: Because performance matters! Architecture Next 20
 
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
WordCamp Athens 2017 - Building an E-commerce Progressive Web App with React ...
 
Node @ flipkart
Node @ flipkartNode @ flipkart
Node @ flipkart
 

Viewers also liked

C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3Ammara Javed
 
C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2Ammara Javed
 
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)Ontico
 
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...Ontico
 
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016Codemotion
 
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)Ontico
 
Edge 2016 measuring what matters
Edge 2016 measuring what mattersEdge 2016 measuring what matters
Edge 2016 measuring what mattersakamaidevrel
 
App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...Eric D. Schabell
 
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)Ontico
 
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)Ontico
 

Viewers also liked (13)

C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3C++ Programming Club-Lecture 3
C++ Programming Club-Lecture 3
 
C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2C++ Programming Club-Lecture 2
C++ Programming Club-Lecture 2
 
Flip flops
Flip flopsFlip flops
Flip flops
 
Registers
RegistersRegisters
Registers
 
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
TypeScript: особенности разработки / Александр Майоров (Tutu.ru)
 
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
Microsoft Edge и платформа веб-приложений в Windows 10 / Константин Кичинский...
 
Counters
CountersCounters
Counters
 
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
Public speaking 4 geeks - Lorenzo Barbieri - Codemotion Milan 2016
 
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
Современные архитектуры диалоговых систем / Анатолий Востряков (Segmento)
 
Edge 2016 measuring what matters
Edge 2016 measuring what mattersEdge 2016 measuring what matters
Edge 2016 measuring what matters
 
App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...App Dev in the Cloud: Not my circus, not my monkeys...
App Dev in the Cloud: Not my circus, not my monkeys...
 
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
Artisto: опыт запуска нейросетей в production / Эдуард Тянтов (Mail.ru Group)
 
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
NVMf: 5 млн IOPS по сети своими руками / Андрей Николаенко (IBS)
 

Similar to Edge 2016 barbarians at the gateway

Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)💻 Javier Garza
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareAmit Serper
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiPROIDEA
 
Analyzing the State of the Internet
Analyzing the State of the InternetAnalyzing the State of the Internet
Analyzing the State of the InternetDavid Belson
 
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...Tanya Denisyuk
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeNowSecure
 
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...IBM France Lab
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedAkamai Developers & Admins
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportCyren, Inc
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakG3 Communications
 
Edge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationEdge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationAkamai Technologies
 
Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Paul Calvano
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileNat Sakimura
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetAPNIC
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetTom Paseka
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourTaisuke Yamada
 

Similar to Edge 2016 barbarians at the gateway (20)

Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
Real world experiences with HTTP/2 (Michael Gooding, Javier Garza from Akamai)
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
OSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adwareOSX/Pirrit: The blue balls of OS X adware
OSX/Pirrit: The blue balls of OS X adware
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
Analyzing the State of the Internet
Analyzing the State of the InternetAnalyzing the State of the Internet
Analyzing the State of the Internet
 
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
Артем Гавриченков "The Dark Side of Things: Distributed Denial of Service Att...
 
Mobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the CodeMobile Penetration Testing: Episode II - Attack of the Code
Mobile Penetration Testing: Episode II - Attack of the Code
 
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
IBM Bluemix Paris Meetup #22-20170315 Meetup @VillagebyCA - Serverless & Open...
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to Sophisticated
 
Webinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat reportWebinar: Insights from Cyren's 2016 cyberthreat report
Webinar: Insights from Cyren's 2016 cyberthreat report
 
Holiday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For PeakHoliday Retail Readiness: Preparing For Peak
Holiday Retail Readiness: Preparing For Peak
 
DevOps and Cloud Native
DevOps and Cloud NativeDevOps and Cloud Native
DevOps and Cloud Native
 
Edge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live DemonstrationEdge 2014: Million Browser Botnet - Live Demonstration
Edge 2014: Million Browser Botnet - Live Demonstration
 
Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06Real User Measurement Insights, London WebPerf 2018-Nov-06
Real User Measurement Insights, London WebPerf 2018-Nov-06
 
Introduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth ProfileIntroduction to the FAPI Read & Write OAuth Profile
Introduction to the FAPI Read & Write OAuth Profile
 
Why care about a CDN?
Why care about a CDN?Why care about a CDN?
Why care about a CDN?
 
Spoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized InternetSpoofing and Denial of Service: A risk to the decentralized Internet
Spoofing and Denial of Service: A risk to the decentralized Internet
 
DDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internetDDoS And Spoofing, a risk to the decentralized internet
DDoS And Spoofing, a risk to the decentralized internet
 
The Slow Death of Passwords
The Slow Death of PasswordsThe Slow Death of Passwords
The Slow Death of Passwords
 
IoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an HourIoT Deep Dive - Be an IoT Developer for an Hour
IoT Deep Dive - Be an IoT Developer for an Hour
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Edge 2016 barbarians at the gateway

  • 1. © AKAMAI - EDGE 2016 Barbarians at the Gate(way) Dave Lewis, Global Security Advocate
  • 2. © AKAMAI - EDGE 2016 Text #whoami Dave Lewis @gattaca dave@akamai.com
  • 3. © AKAMAI - EDGE 2016 Text
  • 4. © AKAMAI - EDGE 2016 Text
  • 5. © AKAMAI - EDGE 2016 Text
  • 6. © AKAMAI - EDGE 2016 Text
  • 7. © AKAMAI - EDGE 2016 Text We Found Him!
  • 8. © AKAMAI - EDGE 2016 Text å
  • 9. © AKAMAI - EDGE 2016 Text
  • 10. © AKAMAI - EDGE 2016 Text
  • 11. © AKAMAI - EDGE 2016 Text
  • 12. © AKAMAI - EDGE 2016 Text
  • 13. © AKAMAI - EDGE 2016 Text
  • 14. © AKAMAI - EDGE 2016 Text It left me wanting…
  • 15. © AKAMAI - EDGE 2016 Text Game Plan • Actors • Attacks • Tools • Trends • Data • Now what?
  • 16. © AKAMAI - EDGE 2016 Text Actors: For Hire
  • 17. © AKAMAI - EDGE 2016 Text Current(ish) prices on the Russian underground • Hacking corporate mailbox: $500 • Winlocker ransomware: $10-20 • Intelligent exploit bundle: $10-$3,000 • Hiring a DDoS attack: $30-$70/day, $1,200/month • Botnet: $200 for 2,000 bots • DDoS botnet: $700
  • 18. © AKAMAI - EDGE 2016 Text
  • 19. © AKAMAI - EDGE 2016 Text Actors: Bored Kids
  • 20. © AKAMAI - EDGE 2016 Text Bored Teens https://www.flickr.com/photos/ardinhasaphotography/8484164608/sizes/l
  • 21. © AKAMAI - EDGE 2016 Text
  • 22. © AKAMAI - EDGE 2016 Text Hacktivists https://www.flickr.com/photos/sklathill/2255718951/sizes/l
  • 23. © AKAMAI - EDGE 2016 Text Actors: Nation States
  • 24. © AKAMAI - EDGE 2016 Text Standard Villains There are
  • 25. © AKAMAI - EDGE 2016 Text Arch Villains And there are…
  • 26. © AKAMAI - EDGE 2016 Text Attacks
  • 27. © AKAMAI - EDGE 2016 Text Attack Vectors Over HTTP
  • 28. © AKAMAI - EDGE 2016 Text Attack Vectors Over HTTPS
  • 29. © AKAMAI - EDGE 2016 Text Types of Attacks SYN Floods UDP Floods ICMP Floods NTP Amplification HTTP Flood
  • 30. © AKAMAI - EDGE 2016 Text Attacks: Volumetric
  • 31. © AKAMAI - EDGE 2016 Text Your website can be overwhelmed…
  • 32. © AKAMAI - EDGE 2016 Text
  • 33. © AKAMAI - EDGE 2016 Text
  • 34. © AKAMAI - EDGE 2016 Text
  • 35. © AKAMAI - EDGE 2016 Text Attacks: Application Layer
  • 36. © AKAMAI - EDGE 2016 Text
  • 37. © AKAMAI - EDGE 2016 Text Application Layer DDoS
  • 38. © AKAMAI - EDGE 2016 Text
  • 39. © AKAMAI - EDGE 2016 Text
  • 40. © AKAMAI - EDGE 2016 Text
  • 41. © AKAMAI - EDGE 2016 Text Attacks: Extortion
  • 42. © AKAMAI - EDGE 2016 Text DD4BC Began by targeting sites with ransom demands Failure to pay lead to increased $$$ to stop the attack Earlier attacks focused on businesses that would avoid reporting the attacks to law enforcement. Once research published they relocated their campaigns to APAC
  • 43. © AKAMAI - EDGE 2016 Text
  • 44. © AKAMAI - EDGE 2016 Text More recently… • DD4BC continues to inform victims that they will launch a DDoS attack of 400-500 Gbps against them. • To date, DD4BC attack campaigns mitigated by Akamai have not exceeded 50 Gbps in size. • That’s up from the high of 15-20 Gbps observed
  • 45. © AKAMAI - EDGE 2016 Text
  • 46. © AKAMAI - EDGE 2016 Text
  • 47. © AKAMAI - EDGE 2016 Text Attacks: Amplification
  • 48. © AKAMAI - EDGE 2016 Text
  • 49. © AKAMAI - EDGE 2016 Text
  • 50. © AKAMAI - EDGE 2016 Text Tools
  • 51. © AKAMAI - EDGE 2016 Text Tools: Havij
  • 52. © AKAMAI - EDGE 2016 Text Tools: Donut
  • 53. © AKAMAI - EDGE 2016 Text Tools: Donut (con’t) GET / HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/msword, application/vnd.ms-powerpoint, application/vnd.ms-excel, */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705) Host: www.foo.bar Connection: Close
  • 54. © AKAMAI - EDGE 2016 Text Tools: HULK
  • 55. © AKAMAI - EDGE 2016 Text Tools: HULK (con’t) GET /?NJB=VURZQ HTTP/1.1 Accept-Encoding: identity Host: www.foo.bar Keep-Alive: 112 User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Connection: close Referer: http://www.foo.bar Cache-Control: no-cache
  • 56. © AKAMAI - EDGE 2016 Text Tools: LOIC
  • 57. © AKAMAI - EDGE 2016 Text Tools: HOIC
  • 58. © AKAMAI - EDGE 2016 Text Tools: Brobot Brobot is a PHP trojan that allows an attacker to take control of a victim's compromised hosted Web server and use it to launch DDOS attacks.
  • 59. © AKAMAI - EDGE 2016 Text Tools: SSHowDown CVE-2004-1653
  • 60. © AKAMAI - EDGE 2016 Text Tools: Mirai
  • 61. © AKAMAI - EDGE 2016 Text
  • 62. © AKAMAI - EDGE 2016 Text Tools: WGET
  • 63. © AKAMAI - EDGE 2016 Text Trends
  • 64. © AKAMAI - EDGE 2016 Text Media Grandstanding
  • 65. © AKAMAI - EDGE 2016 Text Commoditization of DDoS https://www.flickr.com/photos/trophygeek/7309935684/sizes/l
  • 66. © AKAMAI - EDGE 2016 Text
  • 67. © AKAMAI - EDGE 2016 Text
  • 68. © AKAMAI - EDGE 2016 Text What’s your fancy?
  • 69. © AKAMAI - EDGE 2016 Text What’s a Booter? https://www.flickr.com/photos/chicagobart/4480217217/sizes/l
  • 70. © AKAMAI - EDGE 2016 Text OK, What’s a Stresser? Image Credit: Honda
  • 71. © AKAMAI - EDGE 2016 Text Stressers or Booters • xBOOT • Flash Stresser • Hyper Stresser • Grim Booter • Anonymous Stresser • Titanium Stresser / Lizards • Big Bang Booter…and so on.
  • 72. © AKAMAI - EDGE 2016 Text
  • 73. © AKAMAI - EDGE 2016 Text Some other highlights • DDoS agents targeting Joomla and other SaaS apps • A heap-based buffer overflow vulnerability in Linux systems • Attackers using new MS SQL reflection techniques • Data breaches fueling login attacks
  • 74. © AKAMAI - EDGE 2016 Text OK so, attribution? https://www.flickr.com/photos/45909111@N00/8519280338/sizes/l
  • 75. © AKAMAI - EDGE 2016 Text
  • 76. © AKAMAI - EDGE 2016 Text
  • 77. © AKAMAI - EDGE 2016 Text MEGA MEGA MEGA These large attacks all contained SYN floods 12:34:04.270528 IP X.X.X.X.54202 > Y.Y.Y.Y.80: Flags [S], seq 1801649395:1801650365, win 64755, length 970 ....E.....@...}.6.....6....Pkb......P...c......................................... ..........................<snip>..................................................
  • 78. © AKAMAI - EDGE 2016 Text DDoS: Function of Time
  • 79. © AKAMAI - EDGE 2016 Text Other Observations • SQLi • Local/Remote File Inclusion • IoT botnets coming to the forefront • PHP Injection • Malicious File upload • JAVA …best remote access platform ever!
  • 80. © AKAMAI - EDGE 2016 Text SQL Injection…still
  • 81. © AKAMAI - EDGE 2016 Text
  • 82. © AKAMAI - EDGE 2016 Text Why this is a problem
  • 83. © AKAMAI - EDGE 2016 Text
  • 84. © AKAMAI - EDGE 2016 Text Passwords
  • 85. © AKAMAI - EDGE 2016 Text
  • 86. © AKAMAI - EDGE 2016 Text File Inclusions
  • 87. © AKAMAI - EDGE 2016 Text Malicious Uploads • KCFinder file upload vulnerability • Open Flash Chart file upload vulnerability (CVE-2009-4140) • appRain CMF (uploadify.php) unrestricted file upload exploit (CVE-2012- 1153) • FCKeditor file upload vulnerability (CVE-2008-6178)
  • 88. © AKAMAI - EDGE 2016 Text Undead Army https://www.flickr.com/photos/scabeater/3272684874/sizes/o/
  • 89. © AKAMAI - EDGE 2016 Text So, what to do? • I might know a vendor that could help :-) • SQL INJECTION IS A SOLVABLE PROBLEM • Harden systems • Work with your ISP on mitigation strategies • Use ACL lists to deal with known bad IPs • IP Rate limiting • PATCH PATCH PATCH
  • 90. © AKAMAI - EDGE 2016 Text
  • 91. © AKAMAI - EDGE 2016 Text STATEOFTHEINTERNET.COM
  • 92. © AKAMAI - EDGE 2016 Text
  • 93. © AKAMAI - EDGE 2016 Text Thanks!
  • 94. © AKAMAI - EDGE 2016 Text Thanks for listening!
  • 95. © AKAMAI - EDGE 2016 Text Questions? Thanks Dave Lewis @gattaca dave@akamai.com