SlideShare a Scribd company logo
1 of 10
Download to read offline
1
Case	Study:	Time-line	of	DDoS	campaigns	against	MIT	
Authored	by	Wilber	Mejia,	Akamai	SIRT	
1.0	/	OVERVIEW	/	THIS	publication	details	a	series	of	DDoS	attack	campaigns	against	the	
Massachusetts Institute of Technology (MIT)	network.	So	far	in	2016,	MIT	has	received	more	than	35	
DDoS	campaigns	against	several	different	targets	which	have	been	mitigated	by	at	least	one	of	our	
cloud	solutions.	
Further	investigation	by	Akamai	SIRT	revealed	that	close	to	43%	of	attack	vectors	leveraged	during	these	
campaigns	included	DDoS	reflection	and	amplification	attack	vectors.	The	full	vector	list	consisted	of	
ACK	,	CHARGEN,	DNS,	GET,	ICMP,	NTP,	NETBIOS,	RESERVE	protocol,	SNMP,	SSDP,	SYN,	TCP	anomaly,	
UDP,	and	UDP	FRAGMENT	floods.	Attackers	targeted	multiple	destination	IPs	within	the	MIT	network	
during	the	campaigns.	Attacks	originated	from	a	combination	of	devices	vulnerable	to	reflection	abuse	
and	spoofed	IP	sources.	The	full	vector	distribution	breakdown	for	all	attacks	is	listed	in	Figure	4.
The	analysis	is	based	on	fingerprinted	signatures	collected	from	attack	reports	as	well	as	the	source	IPs	
from	our	mitigation	devices.	The	largest	attack	campaign	peaked	at	295	Gbps	consisting	of	only	a	UDP	
flood	attack	vector.	Prior	to	that,	the	largest	attack	peaked	at	89.35	using	a	combination	of	UDP	flood,	
DNS	flood,	and	UDP	fragment	attack	vectors.	During	this	campaign	attackers	targeted	a	total	of	three	
destination	IP	addresses.	These	attack	types	have	commonly	been	included	in	sites	offering	so	called	
booter	or	stresser	services.
UDP	and	DNS	reflections	attack	vectors	generated	the	majority	of	attack	traffic	from	the	investigated	
campaigns.	However,	on	May	6th	of	2015,	MIT	experienced	a	very	large	DDoS	campaign	which	included	
a	specific	padded	SYN	flood.	Additional	information	surrounding	this	campaign	is	described	in	more	
detail	within	the Q3	2015	State	of	the	Internet	-	Security	Report.	
2.0	/	HIGHLIGHTED	ATTACK	CAMPAIGN	ATTRIBUTES	/		Although	Xor	DDoS	BOTNET	attacks	were	
persistent,	they	did	not	produce	the	largest	amount	of	malicious	traffic	against	MIT.	As	mentioned	
previously,	the	largest	attack	peaked	at	295	Gbps	|	58.6	Mpps	while	the	second	largest	attack	peaked	at	
89.35	Gbps	|	8.37	Mpps.	The	latter	attack	was	launched	using	attacks	and	tools	commonly	offered	in	
booter/stresser	suites.	The	295	Gbps	attack	was	comprised	of	a	specific	UDP	flood	signature	which	is	
believed	to	be	part	of	a	malware	variant	known	as	STD/Kaiten.	An	ongoing	investigation	is	being	
conducted	by	Akamai	SIRT	regarding	this	malware.	Listed	below	are	some	campaign	highlights:	
TLP:	WHITE	 	
Issue	Date:	7.22.2016
2
LARGEST	ATTACK	CAMPAIGN
● Event	Time	Start:	Jun		7,	2016	22:48:55	UTC
● Event	Time	End:	Jun		8,	2016	17:04:04	UTC
● Peak	bandwidth:	295	Gigabits	per	second
● Peak	packets	per	second:	58.6	Million	Packets	per	second
● Attack	Vector:	UDP	Flood,	UDP	Fragment,	DNS	Flood
● Source	port:	randomized
● Destination	port:	80
UDP	Flood:
22:48:55.057813	IP	x.x.x.x.48679	>	x.x.x.x.80:	UDP,	length	600
22:48:55.057815	IP	x.x.x.x.46076	>	x.x.x.x.80:	UDP,	length	600
22:48:55.057819	IP	x.x.x.x.34698	>	x.x.x.x.80:	UDP,	length	600
22:48:55.057848	IP	181.136.97.12.34161	>	x.x.x.x.80:	UDP,	length	600
22:48:55.057853	IP	181.136.97.12.34161	>	x.x.x.x.80:	UDP,	length	600
22:48:55.057863	IP	201.232.6.199.44219	>	x.x.x.x.80:	UDP,	length	600	
23:58:08.871990	IP	x.x.x.x.4751	>	x.x.x.x.80:	UDP,	length	1
23:58:08.871999	IP	x.x.x.x.4751	>	x.x.x.x.80:	UDP,	length	1
23:58:08.872005	IP	x.x.x.x.4751	>	x.x.x.x.80:	UDP,	length	1
23:58:08.872011	IP	x.x.x.x.4751	>	x.x.x.x.80:	UDP,	length	1
23:58:08.872014	IP	x.x.x.x.4751	>	x.x.x.x.80:	UDP,	length	1
23:58:08.875194	IP	x.x.x.x.4751	>	x.x.x.x.80:	UDP,	length	1
Figure	1:	Largest	documented	UDP	Flood		campaign	against	MIT
SECOND	LARGEST	ATTACK	CAMPAIGN
● Event	Time	Start:	Apr		2,	2016	04:17:00	UTC
● Event	Time	End:	Apr		2,	2016	14:45:11	UTC
● Peak	bandwidth:	89.35	Gigabits	per	second
● Peak	packets	per	second:	8.37	Million	Packets	per	second
● Attack	Vector:	UDP	Flood,	UDP	Fragment,	DNS	Flood
● Source	port:	53,	randomized
● Destination	port:	randomized
Unlike	Xor,	these	kinds	of	attacks	are	more	accessible	to	a	much	larger	population	of	malicious	actors.		
The	fact	is	almost	anyone	with	motivation	and	enough	knowledge	to	determine	the	IP	of	their	target	can	
launch	these	attacks	at	low	cost.	A	recent	look	at	a	pricing	of	popular	sites	offering	DDoS	“stresser”	
services	show	this	can	be	performed	for	as	little	as	19.99/month.
3
Figure	2:	Example	booter	site	pricing	plans
Figure	3	contains	all	the	attack	signatures	used	in	the	specified	DDoS	attack.	In	particular	the	signature	
reveals	the	domains	abused	for	amplificaiton	of	attack	reponses	included	cpsc.gov	and	isc.org.		In	
addition,	these	domains	make	use	of	DNSSEC.	A	recent	Akamai	SIRT	advisory	details	the	increases	in	use	
of	DNSSEC	powered	reflection	attacks.	These	DNS	attacks	have	been	widespread	across	multiple	
industries	including		gaming	and	financial	services.	The	domain	owners	themselves	are	not	at	fault	and	
don't	feel	the	effects	of	these	attacks.	Attackers	abuse	open	resolvers	by	sending	a	barrage	of	spoofed	
DNS	queries	where	the	IP	source	is	set	to	be	the	MIT	target	IP.	Most	of	these	servers	will	cache	the	
initial	response	so	multiple	queries	are	not	made	to	the	authoritative	name	servers.
DNS	reflection	flood
04:17:11.736254	IP	x.x.x.x.53	>	x.x.x.x6007:	45488|	22/0/0	DNSKEY,	AAAA	2600:803:240::2,	A	63.74.109.2,	TXT	"v=spf1	
ip4:63.74.109.6	ip4:x.x.x.x	ip4:x.x.x.x	mx	a:	REDACTED
04:17:11.736257	IP	x.x.x.x.53	>	x.x.x.x.30267:	4354	2/2/0	NS	REDACTED.	(105)
04:17:11.736276	IP	x.x.x.x.53	>	x.x.x.x7519:	45488|	22/0/0	Type51,	RRSIG,	DNSKEY,	DNSKEY,	DNSKEY,	DNSKEY[|domain]
04:17:11.736287	IP	x.x.x.x.53	>	x.x.x.x.44609:	4354|	22/0/0	RRSIG,	A	63.74.109.2,	TXT	"v=spf1	
04:20:08.919421	IP	x.x.x.x.53	>	x.x.x.x.51286:	52156	13/4/2	SPF,	DNSKEY,	DNSKEY,	NAPTR,	TXT	"v=spf1	a	mx	ip4:x.x.x.x/21	
ip4:x.x.x.x/16	ip6:2001:04F8::0/32	ip6:xxx:xxx:xx::xx/128	~all",	REDACTED
04:20:08.920044	IP	x.x.x.x.53	>	x.x.x.x.15097:	64812	13/4/2	MX)	REDACTED
UDP	fragment	flood
04:17:11.736255	IP	x.x.x.x	>	x.x.x.x:	udp
04:17:11.736279	IP	x.x.x.x	>	x.x.x.x:	udp
04:32:25.135792	IP	x.x.x.x	>	x.x.x.x:	udp
04:32:25.135794	IP	x.x.x.x	>	x.x.x.x:	udp
Figure	3:	Second	Largest	documented	DNS	reflection	campaign	against	MIT
All	three	identified	signatures	are	related	to	the	use	of	DNS	reflection	and	amplification.	The	largest	
response	size	of	domains	used	in	the	attack	are	larger	than	4,000	bytes.	This	causes	fragmented	UDP	
responses	due	to	surpassing	the	MTU	size	limit.	In	addition,	the	open	resolvers	at	some	point	responded
4
on	random	source	ports	creating	what	appeared	to	be	a	UDP	flood.	This	flood	contained	parts	of	the	
DNS	responses	as	well.
3.0	/	SAMPLE	SIGNATURES	FROM	ALL	ATTACK	CAMPAIGNS	/		In	Figure	4	we	have	included	attack	
signatures	from	other	DDoS	attack	campaigns	launched	against	MIT.	Some	of	these	are	attributed	to	
specific	attack	tools	or	malware	as	noted	within	the	associated	heading.	All	of	the	reflection	attacks	
included	typically	have	known	attack	scripts	named	after	the	protocol	being	abused	for	reflection.	
Akamai	SIRT	has	identified	several	based	on	active	reflected	DDoS	campaigns	mitigated	throughout	the	
years.	
tcp	anomaly	(no	flag	flood)
06:16:47.376148	IP	x.x.x.x.14009	>	x.x.x.x.63774:	Flags	[],	win	16384,	length	0
06:16:47.376167	IP	x.x.x.x.42368	>	x.x.x.x.14547:	Flags	[],	win	16384,	length	0
udp	flood
00:09:07.369811	IP	x.x.x.x.54235	>	x.x.x.x.80:	UDP,	length	1
00:09:07.369815	IP	x.x.x.x.34839	>	x.x.x.x.80:	UDP,	length	1
udp	flood	-	Valve	Source	Engine	server	attack
05:12:50.302018	IP	x.x.x.x.10900	>	x.x.x.x.80:	UDP,	length	25
.e..E(.5......7F.,1...4Z*..P.!......TSource	Engine	Query.
05:12:50.302023	IP	x.x.x.x.50567	>	x.x.x.x.80:	UDP,	length	25
.e..E(.5/.............4Z...P.!......TSource	Engine	Query.
udp	flood	-	Kaiten	IRC	bot
01:21:07.454468	IP	x.x.x.x.48969	>	x.x.x.x.80:	UDP,	length	50
....E..NkI@.=...mW....4d.I.P.:..std.PRIVMSG	%s	:[STD]Done	hitting	%s!
..PRIVMSG	%s
01:21:07.454578	IP	x.x.x.x.45279	>	x.x.x.x.80:	UDP,	length	50
....E..N..@.:.&.[..k..4d...P.:.gstd.PRIVMSG	%s	:[STD]Done	hitting	%s!
..PRIVMSG	%s
reserved	protocol	flood
09:05:17.104369	IP	x.x.x.x	>	x.x.x.x:		ip-proto-255	40
09:05:17.104391	IP	x.x.x.x	>	x.x.x.x:		ip-proto-255	40
icmp	flood
05:56:30.132249	IP	x.x.x.x	>	x.x.x.x:	ICMP	echo	request,	id	0,	seq	0,	length	1052
05:56:30.132318	IP	x.x.x.x	>	x.x.x.x:	ICMP	echo	request,	id	0,	seq	0,	length	33
05:56:30.132327	IP	x.x.x.x	>	x.x.x.x:	ICMP	echo	request,	id	0,	seq	0,	length	33
ack	flood
21:26:26.747124	IP	x.x.x.x.1313	>	x.x.x.x.64:	.	ack	1599122023	win	65535
21:26:26.747126	IP	x.x.x.x.1299	>	x.x.x.x.54:	.	ack	2431016982	win	65535
syn	flood
19:41:27.945435	IP	x.x.x.x.30739	>	x.x.x.x.80:	Flags	[S],	seq	3212705792,	win	0,	length	0
19:41:27.945449	IP	x.x.x.x.14150	>	x.x.x.x.80:	Flags	[S],	seq	2408579072,	win	0,	length	0
04:00:29.021344	IP	x.x.x.x.834	>	x.x.x.x.80:	Flags	[S],	seq	674742734,	win	16384,	length	0
04:00:29.021350	IP	x.x.x.x.834	>	x.x.x.x.80:	Flags	[S],	seq	674742744,	win	16384,	length	0
5
syn	flood	-	dominate	attack	script
22:46:18.939811	IP	x.x.x.x.50991	>	x.x.x.x.80:	Flags	[SEW],	seq	2223243264,	win	65535,	length	0
22:46:18.939817	IP	x.x.x.x.5076	>	x.x.x.x.80:	Flags	[SEW],	seq	3714842624,	win	65535,	length	0
Reflection	based	attacks	(not	including	DNS)
ntp	flood
03:10:07.762377	IP	x.x.x.x.123	>	x.x.x.x.59007:	NTPv2,	Reserved,	length	440
03:10:07.762520	IP	x.x.x.x.123	>	x.x.x.x.3955:	NTPv2,	Reserved,	length	440
ssdp	flood
04:32:27.704362	IP	x.x.x.x.1900	>	x.x.x.x.80:	UDP,	length	326
04:32:27.704387	IP	x.x.x.x.1900	>	x.x.x.x.80:	UDP,	length	314
04:32:27.704411	IP	x.x.x.x.1900	>	x.x.x.x.80:	UDP,	length	268
04:32:27.704436	IP	x.x.x.x.1900	>	x.x.x.x.80:	UDP,	length	268
04:32:27.704461	IP	x.x.x.x.1900	>	x.x.x.x.80:	UDP,	length	290
snmp	flood
00:37:05.109903	IP	x.x.x.x.161	>	x.x.x.x.80:		[len1468	x.x.x.x.80:		[len1468.U.....P				...0.				......public..	
...S.........0.				.0-..+........!EdgeOS	v1.7.0.4783374.150622.15340...+........
..+.......C..0........C.SD.h0...+........."snmp@domain.com"0...+.........router-sflanxxxx...+........
chargen	flood
16:11:12.127001	IP	x.x.x.x	>	x.x.x.x:	udp
....E....9..v.P@..L...4_STUVWX
pqrstuvwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXY
qrstuvwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ
rstuvwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[
stuvwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[
tuvwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]
uvwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^
vwxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_
wxyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`
xyz{|}	!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[]^_`a
netbios	flood
15:41:44.528687	IP	x.x.x.x.137	>	x.x.x.x.80:	NBT	UDP	PACKET(137):	QUERY;	POSITIVE;	RESPONSE;	
UNICAST
15:41:44.528706	IP	x.x.x.x.137	>	x.x.x.x.80:	NBT	UDP	PACKET(137):	QUERY;	POSITIVE;	RESPONSE;	
UNICAST
Figure	4:	Attack	signature	samples	for	campaigns	launched	against	MIT
Between	the	time	frame	of	August	2013	-	April	2016	,	MIT	has	received	a	total	of	74	DDoS	campaigns	
with	a	combination	of	121	attack	vectors.	In	Figure	5	we	see	the	breakdown	of	all	the	vectors	
leveraged.
6
Figure	5:	Attack	vector	percentage	breakdown
A	good	portion	of	these	attacks	used	reflection	based	attack	vectors.	These	reflectors	are	not	necessarily	
owned	or	acquired	by	the	malicious	actors	rather	they	are	abused	for	use	in	these	attacks.	For	attacks	
against	MIT,	the	reflector	population	was	mostly	concentrated	in	China.	In	Figure	6	the	distribution	
shown	is	based	on	18,825	unique	sources	of	reflectors	observed	during	MIT	attacks	and	their	country	of	
origin.	China	alone	had	the	highest	number	of	reflectors	per	a	single	country	in	relation	to	all	other	
countries	where	reflectors	were	sourcing	from.
Figure	6:	Distribution	of	reflectors	which	totaled	18,825	unique	sources
7
4.0	/	ATTACK	CAMPAIGNS	IN	2015	/	In	2015,	30	DDoS	campaigns	were	detected	and	mitigated	over	our	
distributed	scrubbing	centers.	One	of	the	largest	DDoS	attack	campaigns	occurred	on	May	5th	2015	
consisting	of	an	Xor	botnet	SYN	Flood.
● Event	Time	Start:	May		5,	2015	00:00:00	UTC
● Event	Time	End:	May		6,	2015	01:16:48	UTC
● Peak	bandwidth:		41.5	Gigabits	per	second
● Peak	packets	per	second:		5.5	Million	Packets	per	second
● Attack	Vector:	SYN	Flood
● Source	port:	Random
● Destination	port:	80
This	vector	is	confirmed	to	be	produced	by	the	Xor	DDoS	malware.	This	was	the	last	of	a	series	of	4	
attacks	from	this	botnet.	A	later	attack	followed	in	December.	In	particular	the	malware	is	of	Chinese	
origin.	Attacks	matching	this	payload	have	mostly	targeted	organizations	in	Asia.	The	few	cases	of	
attacks	out	of	Asia	indicate	the	botnet	was	under	control	by	malicious	actors	operating	out	of	China.		
This	botnet	was	believed	to	have	been	taken	down	following	reports	of	arrests	made	in	China	regarding	
the	use	of	the	botnet	in	attacks.	
Although	attacks	did	stop	shortly	after	those	reports,	some	attacks	using	this	malware	are	starting	to	
occur	again	this	year,	although	at	a	much	lower	bandwidth	peaks.	Figure	7	provides	bandwidth	and	
timeline	of	xor	specific	attacks.	The	botnet	attacks	consisted	of	SYN	flood	traffic.
Fig	7	-	xor	attack	timeline	with	peak	Gbps	and	Mpps
5.0	 /	 ATTACK	 TOOLS	 -	 XOR	 DDOS	 AND	 OTHERS	 /	 Akamai	 SIRT	 was	 able	 to	 obtain	 and	 analyze	 a	
sample	of	the	Xor	DDoS	malware	sample	used	in	the	SYN	flood	attack	campaign	against	MIT.	A	full	
copy	of	the	Xor	DDoS	threat	advisory	can	be	found	here.
8
The	following	represents	a	packet	sample	as	seen	in	the	wireshark	protocol	analysis	tool.	
The	characteristics	observed	matched	exactly	with	the	Xor	payload	attacks.	
Figure	8:	Xor	packet	sample	with	3	flags	set.
XOR	SYN	Flood
07:43:00.790843	IP	x.x.x.x.29868	>	x.x.x.x.80:	Flags	[S],	seq	1957463376:1957464272,	win	65535,	length	896
07:43:00.790843	IP	x.x.x.x.63903	>	x.x.x.x.80:	Flags	[S],	seq	4188011121:4188012017,	win	65535,	length	896
07:43:00.790844	IP	x.x.x.x.44652	>	x.x.x.x.80:	Flags	[S],	seq	2926328590:2926329486,	win	65535,	length	896
07:43:00.790846	IP	x.x.x.x.14450	>	x.x.x.x.80:	Flags	[S],	seq	947050872:947051768,	win	65535,	length	896
07:43:00.847578	IP	x.x.x.x.52587	>	x.x.x.x.80:	Flags	[S],	seq	3446345520:3446346416,	win	65535,	length	896
07:43:00.847579	IP	x.x.x.x.36150	>	x.x.x.x.80:	Flags	[SE],	seq	2369138793:2369139689,	win	65535,	length	896
07:43:00.847579	IP	x.x.x.x.25421	>	x.x.x.x.80:	Flags	[S],	seq	1666031903:1666032799,	win	65535,	length	896
07:43:00.847581	IP	x.x.x.x.18694	>	x.x.x.x.80:	Flags	[SE],	seq	1225191529:1225192425,	win	65535,	length	896
07:43:00.847581	IP	x.x.x.x.45937	>	x.x.x.x.80:	Flags	[SW],	seq	3010528554:3010529450,	win	65535,	length	896
07:43:00.847582	IP	x.x.x.x.20853	>	x.x.x.x.80:	Flags	[SEW],	seq	1366671372:1366672268,	win	65535,	length	896
07:43:00.847582	IP	x.x.x.x.7638	>	x.x.x.x.80:	Flags	[SEW],	seq	500597574:500598470,	win	65535,	length	896
	Fig	9	-	Attack	payload	traffic	samples	-	Xor	SYN	flood
The	intention	of	the	malware	creator	was	to	create	a	padded	SYN	flood.	In	some	cases	various	other	
flags	are	applied	to	the	TCP	header.	The	extra	flags	that	occur	are	due	to	errors	in	the	construction	of	
the	TCP	header.	The	TCP	header	options	are	always	static	but	are	sometimes	placed	in	the	wrong	
locations	due	to	header	size	calculation	errors.	
Aside	from	the	Xor	malware,	most	of	the	attack	scripts	available	are	written	in	the	C	programming	
language.	The	various	SYN	flood	attack	scripts	seem	to	be	based	on	or	share	the	same	code.	These	are	
the	types	of	attacks	typically	available	on	booter/stresser	sites.	Common	SYN	flood	scripts	include	ESYN,	
XSYN,	and	DOMINATE.	One	obvious	example	of	shared	or	reused	code	is	observed	in	a	comment	within	
the	DOMINATE	script.	Figure	10	contains	the	comment	found	in	one	of	the	scripts	indicating	how	similar	
these	are.
9
/*	"DOMINATE"	Attack	Script,	this	script	was	so	difficult	to	make,	it	required	taking	the	very	public	ESSYN
attack	script,	and	replacing	"tcph->res2	=	1;"	to	"tcph->res2	=	3;"	in	the	"setup_tcp_header"	function.
Anybody	who	purchased	this	script	for	$300	BTC,	yup,	it's	literally	changing	a	1	to	a	3.
Leaked	/	Made	by	Andy	Quez,	A	real	mexian	hero.
*/
Figure	10:	DOMINATE	attack	script	comment	indicating	code	re-use.
In	addition	all	scripts	randomly	generate	spoofed	source	addresses	and	in	most	cases	randomize	source	
ports.
For	UDP	based	reflection	attacks.	The	various	attack	script	code	also	borrows	from	other	reflection	
attack	scripts.	For	example,	in	the	next	figure	the	most	common	change	is	the	request	payload	and	
destination	port.
SSDP	attack	script	query:
udph->dest	=	htons(1900);
								udph->check	=	0;
								strcpy((void	*)udph	+	sizeof(struct	udphdr),	"M-SEARCH	*	
HTTP/1.1rnHost:239.255.255.250:1900rnST:ssdp:allrnMan:"ssdp:discover"rnMX:3rnrn");
Netbios	attack	script	query:
udph->dest	=	htons(137);
								udph->check	=	0;
								memcpy((void	*)udph	+	sizeof(struct	udphdr),	
"xe5xd8x00x00x00x01x00x00x00x00x00x00x20x43x4bx41x41x41x41x41x41x41x41x41x4
1x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x41x00x00x21x00x
01",	50);
Figure	11:	SSDP	and	Netbios	reflection	script	payload	sections.
6.0	/	CONCLUSION	/	While	analyzing	attacks,	it	is	usually	very	difficult	to	obtain	attribution.	In	the	case	
of	Xor	it's	possible	that	this	botnet	was	under	the	control	of	a	group	in	China	as	per	the	arrests	in	this	
report.	No	attacks	from	Xor	were	observed	during	a	period	of	time	following	this	news.	Other	attack	
methods,	mostly	available	in	booter	sites,	add	a	larger	pool	of	potential	actors.	As	more	data	is	collected	
from	attacks,	it	may	be	possible	to	narrow	it	down	further	by	booter	site.	Akamai	SIRT	will	provide	
updates	as	available.
Customers	who	believe	they	are	at	risk	and	need	additional	direction	can	contact	Akamai	directly	
through	CCare	at	1-	877-4-AKATEC	(US	And	Canada)	or	617-444-4699	(International),	they're	
Engagement	Manager,	or	their	account	team.
To	access	other	white	papers,	threat	advisories	and	security	research	publications,	please	visit	our	
Security	Research	and	Intelligence	section	on	Akamai	Community.
10
About	Akamai	Security	Intelligence	Response	Team	(SIRT)	Focuses	on	mitigating	malicious	global	cyber	threats	and	vulnerabilities,	the	Akamai	Security	Intelligence	
Response	Team	(SIRT)	conducts	and	shares	digital	forensics	and	post-event	analysis	with	the	security	community	to	proactively	protect	against	threats	and	attacks.	
As	part	of	its	mission,	the	Akamai	SIRT	maintains	close	contact	with	peer	organizations	around	the	world	and	trains	Akamai’s	Professional	Services	and	Customer	
Care	tram	to	both	recognize	and	counter	attacks	from	a	wide	range	of	adversies.	The	research	performed	by	the	Akamai	SIRTis	intended	to	help	ensure	Akamai’s	
cloud	security	products	are	best	of	breed	and	can	protect	against	any	of	the	latest	threats	impacting	the	industry.	
About	Akamai	
As	the	global	leader	in	Content	Delivery	Network	(CDN)	services,	Akamai	makes	the	Internet	fast,	reliable	and	secure	for	its	customers.	The	company's	advanced	
web	performance,	mobile	performance,	cloud	security	and	media	delivery	solutions	are	revolutionizing	how	businesses	optimize	consumer,	enterprise	and	
entertainment	experiences	for	any	device,	anywhere.	To	learn	how	Akamai	solutions	and	its	team	of	Internet	experts	are	helping	businesses	move	faster	forward,	
please	visit	www.akamai.com	or	blogs.akamai.com,	and	follow	@Akamai	on	Twitter.	
Akamai	is	headquarted	in	Cambridge,	Massachusetts	in	the	United	Stats	with	operations	in	more	than	40	offices	around	the	world.	Our	services	and	renowened	
customer	care	enable	businesses	to	provide	an	unparalleled	Internet	experience	for	their	customers	worldwide.	Addresses,	phone	numbers	and	contact	information	
for	all	locations	are	listed	on	www.akamai.com/locations	
©2016	Akamai	Technologies,	Inc.	All	Rights	Reserved.	Reproduction	in	whole	or	in	part	in	any	form	or	medium	without	express	written	permission	is	prohibited.	
Akamai	and	the	Akamai	wave	logo	are	registered	trademarks.	Other	trademarks	contained	herein	are	the	property	of	their	respective	owners.	Akamai	believes	that	
the	information	in	this	publication	is	accurate	of	it’s	publication	date;	such	information	is	subject	to	change	without	notice.	Published	07/16

More Related Content

What's hot

DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyStephanie Weagle
 
Network Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICENetwork Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICEPranya Prabhakar
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015Stephanie Weagle
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016Andrey Apuhtin
 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureIEEEFINALYEARPROJECTS
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...Migrant Systems
 
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19Alex Smirnoff
 
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IJNSA Journal
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments IJITCA Journal
 
Study of flooding based d do s attacks and their effect using deter testbed
Study of flooding based d do s attacks and their effect using deter testbedStudy of flooding based d do s attacks and their effect using deter testbed
Study of flooding based d do s attacks and their effect using deter testbedeSAT Publishing House
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfslametarrokhim1
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSIJNSA Journal
 

What's hot (17)

DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
 
DDOS ATTACKS
DDOS ATTACKSDDOS ATTACKS
DDOS ATTACKS
 
Network Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICENetwork Intrusion detection and Countermeasure sElection(NICE
Network Intrusion detection and Countermeasure sElection(NICE
 
L1803046876
L1803046876L1803046876
L1803046876
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015Rewriting the Rules for DDoS Protection in 2015
Rewriting the Rules for DDoS Protection in 2015
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
 
Nice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasureNice network intrusion detection and countermeasure
Nice network intrusion detection and countermeasure
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
The Quarantine Report: Cybersecurity Impact Assessment for COVID-19
 
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Ho...
 
Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments Preventing Distributed Denial of Service Attacks in Cloud Environments
Preventing Distributed Denial of Service Attacks in Cloud Environments
 
Study of flooding based d do s attacks and their effect using deter testbed
Study of flooding based d do s attacks and their effect using deter testbedStudy of flooding based d do s attacks and their effect using deter testbed
Study of flooding based d do s attacks and their effect using deter testbed
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Improving routing security through concerted action
Improving routing security through concerted actionImproving routing security through concerted action
Improving routing security through concerted action
 
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKSPASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS
 

Similar to Time line-of-ddos-campaigns-against-mit-threat-advisory

Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...IRJET Journal
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSIJNSA Journal
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsIJNSA Journal
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxnettletondevon
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxgalerussel59292
 
Paper id 41201622
Paper id 41201622Paper id 41201622
Paper id 41201622IJRAT
 
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...ijtsrd
 
FireEye Report.ppt
FireEye Report.pptFireEye Report.ppt
FireEye Report.pptDubemJavapi
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014Marcello Marchesini
 
Akamai security report
Akamai security reportAkamai security report
Akamai security reportHonza Beranek
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedeSAT Journals
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGIJCI JOURNAL
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMcscpconf
 
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...IJCNCJournal
 

Similar to Time line-of-ddos-campaigns-against-mit-threat-advisory (20)

Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
Machine Learning Techniques Used for the Detection and Analysis of Modern Typ...
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSLATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKS
 
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONSA SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
A SURVEY OF TRENDS IN MASSIVE DDOS ATTACKS AND CLOUD-BASED MITIGATIONS
 
A survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigationsA survey of trends in massive ddos attacks and cloud based mitigations
A survey of trends in massive ddos attacks and cloud based mitigations
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
 
An Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docxAn Overview of Cyber Attack and Computer Network Operations Si.docx
An Overview of Cyber Attack and Computer Network Operations Si.docx
 
Paper id 41201622
Paper id 41201622Paper id 41201622
Paper id 41201622
 
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
 
50320140501004 2
50320140501004 250320140501004 2
50320140501004 2
 
FireEye Report.ppt
FireEye Report.pptFireEye Report.ppt
FireEye Report.ppt
 
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
PALO ALTO -NETWORKS  Application Usage & Threat Report 2014PALO ALTO -NETWORKS  Application Usage & Threat Report 2014
PALO ALTO -NETWORKS Application Usage & Threat Report 2014
 
Akamai security report
Akamai security reportAkamai security report
Akamai security report
 
APT - Project
APT - Project APT - Project
APT - Project
 
Study of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbedStudy of flooding based ddos attacks and their effect using deter testbed
Study of flooding based ddos attacks and their effect using deter testbed
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEMA SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
A SYNCHRONIZED DISTRIBUTED DENIAL OF SERVICE PREVENTION SYSTEM
 
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection based on Pertinent System Calls Using Machine Lea...
 

More from Andrey Apuhtin

More from Andrey Apuhtin (20)

Shadow pad technical_description_pdf
Shadow pad technical_description_pdfShadow pad technical_description_pdf
Shadow pad technical_description_pdf
 
Ftc cdt-vpn-complaint-8-7-17
Ftc cdt-vpn-complaint-8-7-17Ftc cdt-vpn-complaint-8-7-17
Ftc cdt-vpn-complaint-8-7-17
 
Hutchins redacted indictment
Hutchins redacted indictmentHutchins redacted indictment
Hutchins redacted indictment
 
Dr web review_mob_july_2017
Dr web review_mob_july_2017Dr web review_mob_july_2017
Dr web review_mob_july_2017
 
Dmarc
DmarcDmarc
Dmarc
 
Pandalabs отчет за 1 квартал 2017
Pandalabs   отчет за 1 квартал 2017Pandalabs   отчет за 1 квартал 2017
Pandalabs отчет за 1 квартал 2017
 
Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Cldap threat-advisory
Cldap threat-advisoryCldap threat-advisory
Cldap threat-advisory
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
Rand rr1751
Rand rr1751Rand rr1751
Rand rr1751
 
Apwg trends report_q4_2016
Apwg trends report_q4_2016Apwg trends report_q4_2016
Apwg trends report_q4_2016
 
Browser history
Browser historyBrowser history
Browser history
 
Software
SoftwareSoftware
Software
 
Antivirus
AntivirusAntivirus
Antivirus
 
Https interception
Https interceptionHttps interception
Https interception
 
Wilssc 006 xml
Wilssc 006 xmlWilssc 006 xml
Wilssc 006 xml
 
News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017
 
Windows exploitation-2016-a4
Windows exploitation-2016-a4Windows exploitation-2016-a4
Windows exploitation-2016-a4
 
Mw stj 08252016_2
Mw stj 08252016_2Mw stj 08252016_2
Mw stj 08252016_2
 
150127iotrpt
150127iotrpt150127iotrpt
150127iotrpt
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 

Time line-of-ddos-campaigns-against-mit-threat-advisory