SlideShare a Scribd company logo
1 of 54
Layer 7 DoS Attacks
   and Defenses
     LayerOne, 2011
Bio
Summary

• The DoS Circus
• Layer 4 DDoS: Thousands of attackers
  bring down one site
• Layer 7 DoS: One attacker brings
  down one site
• Link-Local DoS: IPv6 RA Attack: One
  attacker brings down a whole network
The DoS Circus
   Characters
Wikileaks
• Published <1000 US Gov't
  diplomatic cables from
  a leak of 250,000
• Distributed an encrypted "Insurance" file by
  BitTorrent
  • Widely assumed to contain the complete,
    uncensored leaked data
  • Encrypted with AES-256--no one is ever getting in
    there without the key
  • Key to be released if Assange is jailed or killed,
    but he is in UK now resisting extradition to
    Sweden and the key has not been released
Anonymous
Operation Payback
• 4chan's Anonymous group
   • Attacked Scientology websites in 2008
   • Attacked the RIAA and other copyright
     defenders
   • Using the Low Orbit Ion Cannon with
     HiveMind (DDoS)
      • "Opt-in Botnet"
HB Gary Federal
• Aaron Barr
  • Developed a questionable
    way to track people down
    online
  • By correlating Twitter,
    Facebook, and other
    postings
  • Announced in Financial
    Times that he had located
    the “leaders” of
    Anonymous and would
    reveal them in a few days
Social Engineering & SQLi




•   http://tinyurl.com/4gesrcj
Leaked HB Gary Emails
• For Bank of America
• Discredit Wikileaks
• Intimidate Journalist Glenn Greenwald
• For the Chamber of Commerce
• Discredit the watchdog group US Chamber Watch
• Using fake social media accounts
• For the US Air Force
• Spread propaganda with fake accounts
•   http://tinyurl.com/4anofw8
Drupal Exploit
Th3j35t3r
• "Hacktivist for Good"
• Claims to be ex-military
• Originally performed DoS attacks on Jihadist
  sites
   • Bringing them down for brief periods, such
     as 30 minutes
   • Announces his attacks on Twitter, discusses
     them on a blog and live on irc.2600.net
Jester's Tweets from Dec 2010
Th3j35t3r v. Wikileaks
• He brought down Wikileaks single-handed
  for more than a day
   – I was chatting with him in IRC while he
     did it, and he proved it was him by
     briefly pausing the attack
Wikileaks Outage




• One attacker, no botnet
Th3j35t3r
• After his Wikileaks attack
  • He battled Anonymous
  • He claims to have trojaned a tool the Anons
    downloaded
  • He claims to pwn Anon insiders now
Jester's Tweets
Westboro Baptist Outage




• 4 sites held down for 8 weeks
• From a single 3G cell phone
   – http://tinyurl.com/4vggluu
Layer 4 DDoS
Many Attackers – One Target
 Bandwidth Consumption
Companies that Refused Service to
           Wikileaks
•   Amazon
•   Paypal
•   Mastercard
•   Visa
•   Many others
Low Orbit Ion Cannon
• Primitive DDoS Attack, controlled via IRC
• Sends thousands of packets per second from
  the attacker directly to the target
• Like throwing a brick through a window
• Takes thousands of participants to bring down
  a large site
   • They tried but failed to bring down Amazon
Low Orbit Ion Cannon
Operation Payback v. Mastercard
• Brought down Visa, Mastercard, and many
  other sites
   – Easily tracked, and easily blocked
   – High bandwidth, cannot be run through
     anonymizer
   – Dutch police have already arrested two
     participants
Mastercard Outage




3,000 to 30,000 attackers working together
Layer 7 DoS

One Attacker – One Target
Exhausts Server Resources
Layer 7 DoS
•   Subtle, concealable attack
•   Can be routed through proxies
•   Low bandwidth
•   Can be very difficult to distinguish from
    normal traffic
HTTP GET
SlowLoris
• Send incomplete GET
  requests
• Freezes Apache with
  one packet per second
R-U-Dead-Yet
• Incomplete HTTP POSTs
• Stops IIS, but requires thousands of
  packets per second
Keep-Alive DoS
• HTTP Keep-Alive allows 100 requests in a
  single connection
• HEAD method saves resources on the
  attacker
• Target a page that is expensive for the server
  to create, like a search
  – http://www.esrun.co.uk/blog/keep-alive-dos-script/
• A php script
  – pkp keep-dead.php
keep-dead
XerXes
• Th3j35t3r's DoS Tool
   • Routed through proxies like Tor to hide the
     attacker's origin
   • No one knows exactly what it does
   • Layer 7 DoS?
XerXes
Link-Local DoS
IPv6 Router Advertisements
IPv4: DHCP
PULL process
 Client requests an IP
 Router provides one



                  I need an IP

                  Use this IP

    Host                         Router
IPv6: Router Advertisements

PUSH process
 Router announces its presence
 Every client on the LAN creates an address and joins
  the network

               JOIN MY NETWORK

                 Yes, SIR

    Host                         Router
Router Advertisement Packet
RA Flood
Windows Vulnerability
• It takes a LOT of CPU for Windows to process
  those Router Advertisements
• 5 packets per second drives the CPU to 100%
• And they are sent to every machine in the LAN
  (ff02::1 is Link-Local All Nodes Multicast)
• One attacker kills all the Windows machines on
  a LAN
Responsible Disclosure
•   Microsoft was alerted by Marc Heuse on July 10, 2010
•   Microsoft does not plan to patch this
•   Juniper and Cisco devices are also vulnerable
•   Cisco has released a patch, Juniper has not
Defenses from RA Floods
•   Disable IPv6
•   Turn off Router Discovery
•   Block rogue RAs with a firewall
•   Get a switch with RA Guard
RA Guard Evasion
• Add "Fragmentation Headers" to the RA
  Packets
  – http://samsclass.info/ipv6/proj/RA-evasion.html
Fragmentation Headers
Defending Websites
Attack > Defense
• Right now, your website is only up
  because
   – Not even one person hates you, or
   – All the people that hate you are ignorant
     about network security
Defense
• Mod Security--free open-source defense
  tool
   • Latest version has some protections
     against Layer 7 DoS

• Akamai has good defense solutions
  • Caching
  • DNS Redirection
  • Javascript second-request trick
Load Balancer
Counterattacks
• Reflecting attacks back to the command &
  control server
• Effective against dumb attackers like
  Anonymous' LOIC
   – Will lose effect if they ever learn about
     Layer 7 DoS, which is happening now
References
References
Anonymous Takes Down U.S. Chamber Of Commerce And
Supporter Websites
 http://goo.gl/Mue9k

Slowloris HTTP DoS
 http://ha.ckers.org/slowloris/

OWASP HTTP DoS Tool
 http://code.google.com/p/owasp-dos-http-post/

Mitigating Slow HTTP DoS Attacks
http://blog.spiderlabs.com/2010/11/advanced-topic-of-the-
week-mitigating-slow-http-dos-attacks.html

‘Tis the Season of DDoS – WikiLeaks Edition (Outage charts)
 http://goo.gl/V5jZc
References
ModSecurity
http://goo.gl/56hbl

Akamai DDoS Report
 http://baythreat.org/MichaelSmith_DDoS.pdf

How Secure Is Julian Assange's "Thermonuclear"
Insurance File?
 http://goo.gl/sY6Nn

Overview of Anonymous and their attack on MasterCard:
 http://goo.gl/lVsCD

Operation Payback Toolkit: LOIC and HiveMind
 http://pastehtml.com/view/1c8i33u.html
References
r-u-dead-yet
 http://code.google.com/p/r-u-dead-yet/

Keep-Alive DoS Script
 http://www.esrun.co.uk/blog/keep-alive-dos-script/

Router Advertisement DoS in Windows
 http://samsclass.info/ipv6/proj/flood-router6a.htm

RA Guard Evasion
 http://samsclass.info/ipv6/proj/RA-evasion.html

XerXes Attack Video
http://goo.gl/j8NQE

More Related Content

What's hot

Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Jason Broz, CIPP/US
 
Mo and Tao 魔与道
Mo and Tao 魔与道Mo and Tao 魔与道
Mo and Tao 魔与道Austin Chou
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKEThere's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKEJeff Beley
 
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnieZoltan Balazs
 
Ransomware the clock is ticking
Ransomware the clock is tickingRansomware the clock is ticking
Ransomware the clock is tickingManoj Kumar Mishra
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysisinder_barara
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanEC-Council
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksRadware
 
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSThotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSJohn Bambenek
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeRadware
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat LandscapeRadware
 
Threat hunting in_windows
Threat hunting in_windowsThreat hunting in_windows
Threat hunting in_windowsChung Wee Jing
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาOnwadee18
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1Onwadee18
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Mikko Hypponen
 

What's hot (16)

Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...Assessing a pen tester: Making the right choice when choosing a third party P...
Assessing a pen tester: Making the right choice when choosing a third party P...
 
Mo and Tao 魔与道
Mo and Tao 魔与道Mo and Tao 魔与道
Mo and Tao 魔与道
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKEThere's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
 
[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie[ENG] IPv6 shipworm + My little Windows domain pwnie
[ENG] IPv6 shipworm + My little Windows domain pwnie
 
Ransomware the clock is ticking
Ransomware the clock is tickingRansomware the clock is ticking
Ransomware the clock is ticking
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNSThotcon 0x5 - Retroactive Wiretapping VPN over DNS
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
 
Threat hunting in_windows
Threat hunting in_windowsThreat hunting in_windows
Threat hunting in_windows
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมาโครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
 
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
 
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
 

Viewers also liked

Shooting schedule overview BlueSkyStudios day 1
Shooting schedule overview BlueSkyStudios day 1Shooting schedule overview BlueSkyStudios day 1
Shooting schedule overview BlueSkyStudios day 1rhsmediastudies
 
Unidad2.procesos políticos.
Unidad2.procesos políticos.Unidad2.procesos políticos.
Unidad2.procesos políticos.Joselin Gómez
 
Planeación de Caminos Forestales
Planeación de Caminos ForestalesPlaneación de Caminos Forestales
Planeación de Caminos ForestalesEliana Molar
 
Maquinaria y equipo
Maquinaria y equipoMaquinaria y equipo
Maquinaria y equipoEliana Molar
 
Algorithm Design & Implementation
Algorithm Design & ImplementationAlgorithm Design & Implementation
Algorithm Design & ImplementationGaditek
 
hiperkolesterolemia (hypercolesterolemia)
hiperkolesterolemia (hypercolesterolemia)hiperkolesterolemia (hypercolesterolemia)
hiperkolesterolemia (hypercolesterolemia)Mela Roviani
 
Programa Nacional de Saúde Escolar
Programa Nacional de Saúde EscolarPrograma Nacional de Saúde Escolar
Programa Nacional de Saúde EscolarGonçalo Silva
 
"O espantalho enamorado" de Guido Visconti
"O espantalho enamorado" de Guido Visconti"O espantalho enamorado" de Guido Visconti
"O espantalho enamorado" de Guido Viscontiisigoncalves
 
Atención a la diversidad1516
Atención a la diversidad1516Atención a la diversidad1516
Atención a la diversidad1516S MD
 
Programación didáctica parte 2
Programación didáctica parte 2Programación didáctica parte 2
Programación didáctica parte 2S MD
 
FYS Partner Photo 5
FYS Partner Photo 5FYS Partner Photo 5
FYS Partner Photo 5pauley237
 
Deepak new resume 2016
Deepak new resume 2016Deepak new resume 2016
Deepak new resume 2016Deepak Itim
 

Viewers also liked (16)

piel y anexos h
piel y anexos hpiel y anexos h
piel y anexos h
 
Shooting schedule overview BlueSkyStudios day 1
Shooting schedule overview BlueSkyStudios day 1Shooting schedule overview BlueSkyStudios day 1
Shooting schedule overview BlueSkyStudios day 1
 
Unidad2.procesos políticos.
Unidad2.procesos políticos.Unidad2.procesos políticos.
Unidad2.procesos políticos.
 
Organigrama de empresa forestal
Organigrama de empresa forestalOrganigrama de empresa forestal
Organigrama de empresa forestal
 
Sistemas de certificacion forestal
Sistemas de certificacion forestalSistemas de certificacion forestal
Sistemas de certificacion forestal
 
Planeación de Caminos Forestales
Planeación de Caminos ForestalesPlaneación de Caminos Forestales
Planeación de Caminos Forestales
 
Maquinaria y equipo
Maquinaria y equipoMaquinaria y equipo
Maquinaria y equipo
 
Algorithm Design & Implementation
Algorithm Design & ImplementationAlgorithm Design & Implementation
Algorithm Design & Implementation
 
hiperkolesterolemia (hypercolesterolemia)
hiperkolesterolemia (hypercolesterolemia)hiperkolesterolemia (hypercolesterolemia)
hiperkolesterolemia (hypercolesterolemia)
 
2 programa curricular-de-educacion-primaria-2017
2 programa curricular-de-educacion-primaria-20172 programa curricular-de-educacion-primaria-2017
2 programa curricular-de-educacion-primaria-2017
 
Programa Nacional de Saúde Escolar
Programa Nacional de Saúde EscolarPrograma Nacional de Saúde Escolar
Programa Nacional de Saúde Escolar
 
"O espantalho enamorado" de Guido Visconti
"O espantalho enamorado" de Guido Visconti"O espantalho enamorado" de Guido Visconti
"O espantalho enamorado" de Guido Visconti
 
Atención a la diversidad1516
Atención a la diversidad1516Atención a la diversidad1516
Atención a la diversidad1516
 
Programación didáctica parte 2
Programación didáctica parte 2Programación didáctica parte 2
Programación didáctica parte 2
 
FYS Partner Photo 5
FYS Partner Photo 5FYS Partner Photo 5
FYS Partner Photo 5
 
Deepak new resume 2016
Deepak new resume 2016Deepak new resume 2016
Deepak new resume 2016
 

Similar to Layer one 2011-sam-bowne-layer-7-dos

Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Apurv Singh Gautam
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the CloudTeri Radichel
 
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerBSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerShellmates
 
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Stephen Abram
 
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...Codemotion
 
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...Codemotion
 
Virus Bulletin 2012
Virus Bulletin 2012Virus Bulletin 2012
Virus Bulletin 2012Cloudflare
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1InfoSec Girls
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptxmalikmuzammil2326
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoitKyle Wilhoit
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud SecuritySBWebinars
 

Similar to Layer one 2011-sam-bowne-layer-7-dos (20)

Dos threats and countermeasures
Dos threats and countermeasuresDos threats and countermeasures
Dos threats and countermeasures
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)Security News Bytes (Aug Sept 2017)
Security News Bytes (Aug Sept 2017)
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama ElhamerBSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
 
DDos
DDosDDos
DDos
 
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)
 
Security events in 2014
Security events in 2014Security events in 2014
Security events in 2014
 
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
 
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
 
Virus Bulletin 2012
Virus Bulletin 2012Virus Bulletin 2012
Virus Bulletin 2012
 
DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1Session for InfoSecGirls - New age threat management vol 1
Session for InfoSecGirls - New age threat management vol 1
 
Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Bh europe 2013_wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoit
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
Top 10 Threats to Cloud Security
Top 10 Threats to Cloud SecurityTop 10 Threats to Cloud Security
Top 10 Threats to Cloud Security
 

More from fangjiafu

Wce internals rooted_con2011_ampliasecurity
Wce internals rooted_con2011_ampliasecurityWce internals rooted_con2011_ampliasecurity
Wce internals rooted_con2011_ampliasecurityfangjiafu
 
Oracle forensics 101
Oracle forensics 101Oracle forensics 101
Oracle forensics 101fangjiafu
 
Understanding and selecting_dsp_final
Understanding and selecting_dsp_finalUnderstanding and selecting_dsp_final
Understanding and selecting_dsp_finalfangjiafu
 
Wce12 uba ampliasecurity_eng
Wce12 uba ampliasecurity_engWce12 uba ampliasecurity_eng
Wce12 uba ampliasecurity_engfangjiafu
 
Ddos analizi
Ddos analiziDdos analizi
Ddos analizifangjiafu
 
Bypass dbms assert
Bypass dbms assertBypass dbms assert
Bypass dbms assertfangjiafu
 
Cursor injection
Cursor injectionCursor injection
Cursor injectionfangjiafu
 
Create user to_sysdba
Create user to_sysdbaCreate user to_sysdba
Create user to_sysdbafangjiafu
 
Presentation nix
Presentation nixPresentation nix
Presentation nixfangjiafu
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddosfangjiafu
 
Tlsoptimizationprint 120224194603-phpapp02
Tlsoptimizationprint 120224194603-phpapp02Tlsoptimizationprint 120224194603-phpapp02
Tlsoptimizationprint 120224194603-phpapp02fangjiafu
 
Presentation nix
Presentation nixPresentation nix
Presentation nixfangjiafu
 
Proper passwordhashing
Proper passwordhashingProper passwordhashing
Proper passwordhashingfangjiafu
 
Burp suite injection中的应用by小冰
Burp suite injection中的应用by小冰Burp suite injection中的应用by小冰
Burp suite injection中的应用by小冰fangjiafu
 
2008 07-24 kwpm-threads_and_synchronization
2008 07-24 kwpm-threads_and_synchronization2008 07-24 kwpm-threads_and_synchronization
2008 07-24 kwpm-threads_and_synchronizationfangjiafu
 

More from fangjiafu (20)

Wce internals rooted_con2011_ampliasecurity
Wce internals rooted_con2011_ampliasecurityWce internals rooted_con2011_ampliasecurity
Wce internals rooted_con2011_ampliasecurity
 
Oracle forensics 101
Oracle forensics 101Oracle forensics 101
Oracle forensics 101
 
Understanding and selecting_dsp_final
Understanding and selecting_dsp_finalUnderstanding and selecting_dsp_final
Understanding and selecting_dsp_final
 
Wce12 uba ampliasecurity_eng
Wce12 uba ampliasecurity_engWce12 uba ampliasecurity_eng
Wce12 uba ampliasecurity_eng
 
Ddos analizi
Ddos analiziDdos analizi
Ddos analizi
 
Bypass dbms assert
Bypass dbms assertBypass dbms assert
Bypass dbms assert
 
Cursor injection
Cursor injectionCursor injection
Cursor injection
 
Create user to_sysdba
Create user to_sysdbaCreate user to_sysdba
Create user to_sysdba
 
Presentation nix
Presentation nixPresentation nix
Presentation nix
 
Layer 7 ddos
Layer 7 ddosLayer 7 ddos
Layer 7 ddos
 
Tlsoptimizationprint 120224194603-phpapp02
Tlsoptimizationprint 120224194603-phpapp02Tlsoptimizationprint 120224194603-phpapp02
Tlsoptimizationprint 120224194603-phpapp02
 
Crypto hlug
Crypto hlugCrypto hlug
Crypto hlug
 
Fp
FpFp
Fp
 
Presentation nix
Presentation nixPresentation nix
Presentation nix
 
Rr 7944
Rr 7944Rr 7944
Rr 7944
 
Proper passwordhashing
Proper passwordhashingProper passwordhashing
Proper passwordhashing
 
Burp suite injection中的应用by小冰
Burp suite injection中的应用by小冰Burp suite injection中的应用by小冰
Burp suite injection中的应用by小冰
 
Oech03
Oech03Oech03
Oech03
 
2008 07-24 kwpm-threads_and_synchronization
2008 07-24 kwpm-threads_and_synchronization2008 07-24 kwpm-threads_and_synchronization
2008 07-24 kwpm-threads_and_synchronization
 
Unit07
Unit07Unit07
Unit07
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Layer one 2011-sam-bowne-layer-7-dos

  • 1. Layer 7 DoS Attacks and Defenses LayerOne, 2011
  • 2. Bio
  • 3. Summary • The DoS Circus • Layer 4 DDoS: Thousands of attackers bring down one site • Layer 7 DoS: One attacker brings down one site • Link-Local DoS: IPv6 RA Attack: One attacker brings down a whole network
  • 4. The DoS Circus Characters
  • 5. Wikileaks • Published <1000 US Gov't diplomatic cables from a leak of 250,000 • Distributed an encrypted "Insurance" file by BitTorrent • Widely assumed to contain the complete, uncensored leaked data • Encrypted with AES-256--no one is ever getting in there without the key • Key to be released if Assange is jailed or killed, but he is in UK now resisting extradition to Sweden and the key has not been released
  • 7. Operation Payback • 4chan's Anonymous group • Attacked Scientology websites in 2008 • Attacked the RIAA and other copyright defenders • Using the Low Orbit Ion Cannon with HiveMind (DDoS) • "Opt-in Botnet"
  • 8. HB Gary Federal • Aaron Barr • Developed a questionable way to track people down online • By correlating Twitter, Facebook, and other postings • Announced in Financial Times that he had located the “leaders” of Anonymous and would reveal them in a few days
  • 9.
  • 10. Social Engineering & SQLi • http://tinyurl.com/4gesrcj
  • 11. Leaked HB Gary Emails • For Bank of America • Discredit Wikileaks • Intimidate Journalist Glenn Greenwald • For the Chamber of Commerce • Discredit the watchdog group US Chamber Watch • Using fake social media accounts • For the US Air Force • Spread propaganda with fake accounts • http://tinyurl.com/4anofw8
  • 13. Th3j35t3r • "Hacktivist for Good" • Claims to be ex-military • Originally performed DoS attacks on Jihadist sites • Bringing them down for brief periods, such as 30 minutes • Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net
  • 15. Th3j35t3r v. Wikileaks • He brought down Wikileaks single-handed for more than a day – I was chatting with him in IRC while he did it, and he proved it was him by briefly pausing the attack
  • 16. Wikileaks Outage • One attacker, no botnet
  • 17. Th3j35t3r • After his Wikileaks attack • He battled Anonymous • He claims to have trojaned a tool the Anons downloaded • He claims to pwn Anon insiders now
  • 19. Westboro Baptist Outage • 4 sites held down for 8 weeks • From a single 3G cell phone – http://tinyurl.com/4vggluu
  • 20. Layer 4 DDoS Many Attackers – One Target Bandwidth Consumption
  • 21. Companies that Refused Service to Wikileaks • Amazon • Paypal • Mastercard • Visa • Many others
  • 22. Low Orbit Ion Cannon • Primitive DDoS Attack, controlled via IRC • Sends thousands of packets per second from the attacker directly to the target • Like throwing a brick through a window • Takes thousands of participants to bring down a large site • They tried but failed to bring down Amazon
  • 23. Low Orbit Ion Cannon
  • 24. Operation Payback v. Mastercard • Brought down Visa, Mastercard, and many other sites – Easily tracked, and easily blocked – High bandwidth, cannot be run through anonymizer – Dutch police have already arrested two participants
  • 25. Mastercard Outage 3,000 to 30,000 attackers working together
  • 26.
  • 27. Layer 7 DoS One Attacker – One Target Exhausts Server Resources
  • 28. Layer 7 DoS • Subtle, concealable attack • Can be routed through proxies • Low bandwidth • Can be very difficult to distinguish from normal traffic
  • 30. SlowLoris • Send incomplete GET requests • Freezes Apache with one packet per second
  • 31. R-U-Dead-Yet • Incomplete HTTP POSTs • Stops IIS, but requires thousands of packets per second
  • 32. Keep-Alive DoS • HTTP Keep-Alive allows 100 requests in a single connection • HEAD method saves resources on the attacker • Target a page that is expensive for the server to create, like a search – http://www.esrun.co.uk/blog/keep-alive-dos-script/ • A php script – pkp keep-dead.php
  • 34. XerXes • Th3j35t3r's DoS Tool • Routed through proxies like Tor to hide the attacker's origin • No one knows exactly what it does • Layer 7 DoS?
  • 36. Link-Local DoS IPv6 Router Advertisements
  • 37. IPv4: DHCP PULL process  Client requests an IP  Router provides one I need an IP Use this IP Host Router
  • 38. IPv6: Router Advertisements PUSH process  Router announces its presence  Every client on the LAN creates an address and joins the network JOIN MY NETWORK Yes, SIR Host Router
  • 41. Windows Vulnerability • It takes a LOT of CPU for Windows to process those Router Advertisements • 5 packets per second drives the CPU to 100% • And they are sent to every machine in the LAN (ff02::1 is Link-Local All Nodes Multicast) • One attacker kills all the Windows machines on a LAN
  • 42. Responsible Disclosure • Microsoft was alerted by Marc Heuse on July 10, 2010 • Microsoft does not plan to patch this • Juniper and Cisco devices are also vulnerable • Cisco has released a patch, Juniper has not
  • 43. Defenses from RA Floods • Disable IPv6 • Turn off Router Discovery • Block rogue RAs with a firewall • Get a switch with RA Guard
  • 44. RA Guard Evasion • Add "Fragmentation Headers" to the RA Packets – http://samsclass.info/ipv6/proj/RA-evasion.html
  • 47. Attack > Defense • Right now, your website is only up because – Not even one person hates you, or – All the people that hate you are ignorant about network security
  • 48. Defense • Mod Security--free open-source defense tool • Latest version has some protections against Layer 7 DoS • Akamai has good defense solutions • Caching • DNS Redirection • Javascript second-request trick
  • 50. Counterattacks • Reflecting attacks back to the command & control server • Effective against dumb attackers like Anonymous' LOIC – Will lose effect if they ever learn about Layer 7 DoS, which is happening now
  • 52. References Anonymous Takes Down U.S. Chamber Of Commerce And Supporter Websites http://goo.gl/Mue9k Slowloris HTTP DoS http://ha.ckers.org/slowloris/ OWASP HTTP DoS Tool http://code.google.com/p/owasp-dos-http-post/ Mitigating Slow HTTP DoS Attacks http://blog.spiderlabs.com/2010/11/advanced-topic-of-the- week-mitigating-slow-http-dos-attacks.html ‘Tis the Season of DDoS – WikiLeaks Edition (Outage charts) http://goo.gl/V5jZc
  • 53. References ModSecurity http://goo.gl/56hbl Akamai DDoS Report http://baythreat.org/MichaelSmith_DDoS.pdf How Secure Is Julian Assange's "Thermonuclear" Insurance File? http://goo.gl/sY6Nn Overview of Anonymous and their attack on MasterCard: http://goo.gl/lVsCD Operation Payback Toolkit: LOIC and HiveMind http://pastehtml.com/view/1c8i33u.html
  • 54. References r-u-dead-yet http://code.google.com/p/r-u-dead-yet/ Keep-Alive DoS Script http://www.esrun.co.uk/blog/keep-alive-dos-script/ Router Advertisement DoS in Windows http://samsclass.info/ipv6/proj/flood-router6a.htm RA Guard Evasion http://samsclass.info/ipv6/proj/RA-evasion.html XerXes Attack Video http://goo.gl/j8NQE