SlideShare a Scribd company logo
Sockstressby Gregory Hanis
Penetration testing is a field which has experienced rapid growth over the years, and is not going to slow
down any time soon. This subject is certainly not to be entered into lightly by either the organization
sponsoring the test, or the testers themselves. There are many legal issues that need to be dealt with
prior to even starting the test not to mention laying down a groundwork of rules for the test such as
which areas are exposed and what the procedure is comprised of. As a newcomer to penetration testing
you need to understand that vulnerabilities exist in all networks, operating systems, and applications.
New attacks and vulnerabilities appear constantly, and even some old and well known attacks seem to
slip through the defenses of modern networks.
Let’s discuss a vulnerability and attack which was introduced in 2008 by Robert E. Lee and Jack Louis,
called Sockstress. Sockstress has been chosen because it is an outstanding example of a vulnerability
exploitation which is well known and in most cases controlled by intrusion detection/prevention
systems. Even though there are many tools available to detect and thwart this threat it still poses a
danger such as in the astounding Spamhaus attack in March of 2013 (Bowne S. , 2013). Descriptions
used here of the attack are by no means comprehensive, but they will give the new penetration tester a
look at a small part of what goes into identifying and mitigating attacks in general.
Briefly, Sockstress is a denial of service attack which consumes resources of devices that accept TCP
connections. The attack itself uses a “user-land” TCP stack, or TCP stack within the application, rather
than the kernel’s TCP stack. Typically it will open an arbitrary number of connections to a server and
engage in the usual 3-way TCP handshake. Once the connection is established Sockstress targets specific
traits of TCP in order to tax resources on the server such as timers, buffer window sizes, and memory
used in the connection. Windows, Mac, Linux, and BSD are all similarly affected by the attack, with the
common vector being TCP (Gibson &Laporte, 2008).
With Sockstress we have a situation where implementation of the tool is difficult enough so that it is not
favored by most script-kiddies, and moreover it is easy enough to mitigate. Consequently not enough
people are paying attention or protecting themselves from it. Killing a server or denying services is
perhaps not as profitable as other exploits in the cyber-crime world, so for the most part parties with the
criminal capabilities have either not taken much interest or are preparing a large scale implementation
for a later date. If there were a widely distributed tool for carrying out these attacks and the proper
defenses had never been developed, perhaps there would be more cause for concern. Today’s script
kiddies however enjoy working in numbers and they have the ability to make mayhem with tools that
are already available.
The beauty of this attack is that it does not require tremendous resources on the part of the attacker- a
small herd of bots is able to tie up enough resources over time to bring down a server. As each
connection is made server resources are committed to that socket or connection. Each zombie computer
continues to establish connections and subversively chew up resources such as RAM. Rather than
flooding the server this attack allows resource degradation rather than connection volume to bring down
a server. In August of this year, Sam Bowne displayed a great example of Sockstress in action at the
BSides Las Vegas conference (Bowne, S. 2013).
Sockstressby Gregory Hanis
It is important to note that this attack can be performed by a single machine, or a small number of
machines. All the attacker needs to supply is different IP addresses in order to mask how many
endpoints are performing the attack. Using a set of zombie computers is a better method of attack
though, because the endpoints can come from different geographic locations. These connections appear
as though they are coming from valid clients to the server, making life difficult for the intrusion detection
systems being used. By no means does that mean there is no defense to the attack. Tools available to
block this attack include those that block IP addresses, or limit how many connections can be made from
a specific IP address.
Cisco suggests mitigation by “allowing only trusted sources to access TCP based services” (Cisco, 2009).
Whitelisting in this way is not feasible with publicly facing servers though. Red Hat recommends “limit
the number of new connections over a time period” (redhat, 2013). Set connection rules to check if
there are more than 10 TCP connections to a port over a given time, suggested at one minute. This gives
a connection rate limit rather than a concurrent connection limit. Red Hat also suggests that once it is
evident that you are under attack block the offensive IP(s). Mitigation will be based on a case by case
basis, but repetitive zero or low value windows set on connections will give a good indication that your
service is at risk (redhat, 2013).
One method of supporting detection of this type of attack is to keep track of connections which are
consistently giving TCP zero window, or low value window returns. The trouble is in false positives. Client
connections may be slow, or routers along the path of the transmission may have full buffers forcing a
real client to invoke TCP's flow control mechanisms, which may make them fit the profile of an attacker.
Connections which have the heuristic or behavioral traits of a Sockstress attack may have to be dropped
forcing the client to reconnect, degrading QoS. Repetitive reconnection attempts from an IP address with
zero or low value windows can be forced to wait for a time between connections, or perhaps even be
blacklisted to prevent further trouble from that IP.
Also, track and monitor system resource usage such as RAM on the server. As the Sockstress clients
connect and tell the server to hold the connection data, the server's RAM usage will gradually start to
ramp up based on how many connections are being made. As the RAM usage increases to a threshold
level, stale connections which are just dithering should be shed reducing resource load. This can still
have a negative impact on QoS. Connections dropped must be algorithmically compared against what is
deemed as a productive connection, hopefully preventing false positives in which too many real clients
lose the service.
After reading this brief description of an attack it should be evident that penetration testing is no
laughing matter. The Spamhaus attack mentioned above has been given light treatment here, but was
actually a remarkably effective attack that had a rippling effect through the Internet which even affected
the London Internet Exchange (LINX) (Dunn, 2013).
Also it is evident that there are many reasons to commit or solicit penetration tests. Having a
penetration test might have found the vulnerabilities at Spamhaus - if it had been discovered. Another
reason to acquire solid pen testing services is to ensure that organizations such as service providers
comply with safeguards imposed by regulatory compliance, contracts, and service level agreements.
These will require various types of insurance that the services provided are secure and interests are
Sockstressby Gregory Hanis
protected. Penetration testing provides proof of due diligence on the part of the organization or service
provider, lending more than a modicum of legal protection.
As a field of employment penetration testing is not going to see reductions for its need across all
industries; quite the opposite will surely be true. As new vulnerabilities continue to be found and crafty
thieves create new tools and attacks the need for network hardening is only going to increase and
become more valuable.

References
Bowne, S. (2013, August 5). BSidesLV 2013 cookie reusesambowne. Retrieved from youtube.com:
https://www.youtube.com/watch?v=AJs-_HhOku0
Bowne, S. (2013).Evil Dos attacks and strong defenses. Retrieved from samsclass.info:
http://samsclass.info/seminars/defcon21-cfp.htm
Cisco. (2009, September 9). Cisco response to outpost24 TCP state table manipulation denial of service
vulnerabilities. Retrieved from cisco.com: http://www.cisco.com/en/US/products/csr/cisco-sr20081017-tcp.html
Dunn, J. (2013, September 30). British teen accused of massive spamhausDDoS attack arrested months
ago. Retrieved from techworld.com: http://news.techworld.com/security/3471224/british-teenaccused-of-massive-spamhaus-ddos-attack-arrested-months-ago/
Gibson, S., &Laporte, L. (2008, October 2). Sockstress; security now! episode 164 transcript.Retrieved
from grc.com: https://www.grc.com/sn/sn-164.htm
redhat. (2013, August 05). Does CVE-2008-4609 affect Red Hat Enterprise Linux? Retrieved from
redhat.com: https://access.redhat.com/site/solutions/18729

More Related Content

What's hot

DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
Jignesh Patel
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
IntruGuard
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
Hands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill Chain
Splunk
 
Advanced security - Seccom Global
Advanced security - Seccom Global Advanced security - Seccom Global
Advanced security - Seccom Global
Kim Tu
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
IJERA Editor
 
Splunk for Security Workshop
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security Workshop
Splunk
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
Infradata
 
Webmasterbreach
WebmasterbreachWebmasterbreach
Webmasterbreach
Édgar Medina
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
HTS Hosting
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1
Selva Raj
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
Symantec Security Response
 

What's hot (14)

DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques10 DDoS Mitigation Techniques
10 DDoS Mitigation Techniques
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
Hands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill Chain
 
Advanced security - Seccom Global
Advanced security - Seccom Global Advanced security - Seccom Global
Advanced security - Seccom Global
 
XST
XSTXST
XST
 
Ix3615551559
Ix3615551559Ix3615551559
Ix3615551559
 
Splunk for Security Workshop
Splunk for Security WorkshopSplunk for Security Workshop
Splunk for Security Workshop
 
Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)Cybersecurity breakfast tour 2013 (1)
Cybersecurity breakfast tour 2013 (1)
 
Webmasterbreach
WebmasterbreachWebmasterbreach
Webmasterbreach
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Denial of-service (do s) attack
Denial of-service (do s) attackDenial of-service (do s) attack
Denial of-service (do s) attack
 
Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1Hop by hop message authentication chapter 1
Hop by hop message authentication chapter 1
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 

Viewers also liked

Using LinkedIn to Find a Job
Using LinkedIn to Find a JobUsing LinkedIn to Find a Job
Using LinkedIn to Find a Job
Coreen Tossona
 
Introducción Diseño Editorial
Introducción Diseño EditorialIntroducción Diseño Editorial
Introducción Diseño Editorial
Felix Jaramillo
 
5 Rules of Good Content
5 Rules of Good Content5 Rules of Good Content
5 Rules of Good Content
Coreen Tossona
 
Abstrak pik
Abstrak pikAbstrak pik
Abstrak pik
awan1351
 
Level 1 and 2
Level 1 and 2Level 1 and 2
Level 1 and 2
jlopez1996
 
Nail Your Next Job Interview
Nail Your Next Job InterviewNail Your Next Job Interview
Nail Your Next Job Interview
Coreen Tossona
 
Building a-brand-for-your-business
Building a-brand-for-your-businessBuilding a-brand-for-your-business
Building a-brand-for-your-business
Coreen Tossona
 
The grinch
The grinchThe grinch
The grinch
Paula Rodriguez
 
2º período
2º período2º período
2º período
aszf fontainhas
 
The grinch
The grinchThe grinch
The grinch
Paula Rodriguez
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
Gregory Hanis
 
How to boost your biz with a buddy
How to boost your biz with a buddyHow to boost your biz with a buddy
How to boost your biz with a buddy
Coreen Tossona
 
Evaluating and forecasting the lithium market from a value perspective
Evaluating and forecasting the lithium market from a value perspectiveEvaluating and forecasting the lithium market from a value perspective
Evaluating and forecasting the lithium market from a value perspective
Roskill
 
Regulamento interno catl
Regulamento interno catlRegulamento interno catl
Regulamento interno catl
aszf fontainhas
 
The grinch
The grinchThe grinch
The grinch
Paula Rodriguez
 
Editorial Calendar - Yes, You Need One. Here's Why.
Editorial Calendar - Yes, You Need One. Here's Why.Editorial Calendar - Yes, You Need One. Here's Why.
Editorial Calendar - Yes, You Need One. Here's Why.
Coreen Tossona
 

Viewers also liked (16)

Using LinkedIn to Find a Job
Using LinkedIn to Find a JobUsing LinkedIn to Find a Job
Using LinkedIn to Find a Job
 
Introducción Diseño Editorial
Introducción Diseño EditorialIntroducción Diseño Editorial
Introducción Diseño Editorial
 
5 Rules of Good Content
5 Rules of Good Content5 Rules of Good Content
5 Rules of Good Content
 
Abstrak pik
Abstrak pikAbstrak pik
Abstrak pik
 
Level 1 and 2
Level 1 and 2Level 1 and 2
Level 1 and 2
 
Nail Your Next Job Interview
Nail Your Next Job InterviewNail Your Next Job Interview
Nail Your Next Job Interview
 
Building a-brand-for-your-business
Building a-brand-for-your-businessBuilding a-brand-for-your-business
Building a-brand-for-your-business
 
The grinch
The grinchThe grinch
The grinch
 
2º período
2º período2º período
2º período
 
The grinch
The grinchThe grinch
The grinch
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
How to boost your biz with a buddy
How to boost your biz with a buddyHow to boost your biz with a buddy
How to boost your biz with a buddy
 
Evaluating and forecasting the lithium market from a value perspective
Evaluating and forecasting the lithium market from a value perspectiveEvaluating and forecasting the lithium market from a value perspective
Evaluating and forecasting the lithium market from a value perspective
 
Regulamento interno catl
Regulamento interno catlRegulamento interno catl
Regulamento interno catl
 
The grinch
The grinchThe grinch
The grinch
 
Editorial Calendar - Yes, You Need One. Here's Why.
Editorial Calendar - Yes, You Need One. Here's Why.Editorial Calendar - Yes, You Need One. Here's Why.
Editorial Calendar - Yes, You Need One. Here's Why.
 

Similar to Penetration testing is a field which has experienced rapid growth over the years

Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
IJEACS
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IJNSA Journal
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
IJNSA Journal
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
IJNSA Journal
 
Https interception
Https interceptionHttps interception
Https interception
Andrey Apuhtin
 
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
indexPub
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
Mumbai Academisc
 
10. 23757.pdf
10. 23757.pdf10. 23757.pdf
10. 23757.pdf
TELKOMNIKA JOURNAL
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
IJRES Journal
 
Research paper
Research paperResearch paper
Research paper
Pavan Muralidhara
 
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSUSER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
pharmaindexing
 
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...
IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
eSAT Publishing House
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
eSAT Journals
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
Vihari Piratla
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
Threat Stack
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
Saptha Wanniarachchi
 

Similar to Penetration testing is a field which has experienced rapid growth over the years (20)

Impact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail ApplicationsImpact of Flash Crowd Attack in Online Retail Applications
Impact of Flash Crowd Attack in Online Retail Applications
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUEA MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
A MECHANISM FOR EARLY DETECTING DDOS ATTACKS BASED ON M/G/R PS QUEUE
 
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
A ROBUST MECHANISM FOR DEFENDING DISTRIBUTED DENIAL OF SERVICE ATTACKS ON WEB...
 
Https interception
Https interceptionHttps interception
Https interception
 
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
WEB-BASED APPLICATION LAYER DISTRIBUTED DENIAL-OF-SERVICE ATTACKS: A DATA-DRI...
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
10. 23757.pdf
10. 23757.pdf10. 23757.pdf
10. 23757.pdf
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
Research paper
Research paperResearch paper
Research paper
 
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSUSER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
 
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...
A Countermeasure for Double Spending Attacks on Blockchain Technology in Smar...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
Efficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvsEfficient ddos attacks security scheme using asvs
Efficient ddos attacks security scheme using asvs
 
DoS/DDoS
DoS/DDoSDoS/DDoS
DoS/DDoS
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
 
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud 3 Reasons Why The Host Rules Intrusion Detection in The Cloud
3 Reasons Why The Host Rules Intrusion Detection in The Cloud
 
Protecting your business from ddos attacks
Protecting your business from ddos attacksProtecting your business from ddos attacks
Protecting your business from ddos attacks
 

More from Gregory Hanis

Hacker bootcamp
Hacker bootcampHacker bootcamp
Hacker bootcamp
Gregory Hanis
 
To cert or not to cert
To cert or not to certTo cert or not to cert
To cert or not to cert
Gregory Hanis
 
Windows great again
Windows great againWindows great again
Windows great again
Gregory Hanis
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
Gregory Hanis
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
Gregory Hanis
 
Oop in php_tutorial
Oop in php_tutorialOop in php_tutorial
Oop in php_tutorial
Gregory Hanis
 
Suncoastscam
SuncoastscamSuncoastscam
Suncoastscam
Gregory Hanis
 
Rollingstone greghanis
Rollingstone greghanisRollingstone greghanis
Rollingstone greghanisGregory Hanis
 
Linuxserver harden
Linuxserver hardenLinuxserver harden
Linuxserver harden
Gregory Hanis
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
Gregory Hanis
 
security IDS
security IDSsecurity IDS
security IDS
Gregory Hanis
 
Pm final project
Pm final projectPm final project
Pm final project
Gregory Hanis
 
Javascript Deofuscation A manual Approach
Javascript Deofuscation A manual ApproachJavascript Deofuscation A manual Approach
Javascript Deofuscation A manual Approach
Gregory Hanis
 

More from Gregory Hanis (13)

Hacker bootcamp
Hacker bootcampHacker bootcamp
Hacker bootcamp
 
To cert or not to cert
To cert or not to certTo cert or not to cert
To cert or not to cert
 
Windows great again
Windows great againWindows great again
Windows great again
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 
Oop in php_tutorial
Oop in php_tutorialOop in php_tutorial
Oop in php_tutorial
 
Suncoastscam
SuncoastscamSuncoastscam
Suncoastscam
 
Rollingstone greghanis
Rollingstone greghanisRollingstone greghanis
Rollingstone greghanis
 
Linuxserver harden
Linuxserver hardenLinuxserver harden
Linuxserver harden
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
security IDS
security IDSsecurity IDS
security IDS
 
Pm final project
Pm final projectPm final project
Pm final project
 
Javascript Deofuscation A manual Approach
Javascript Deofuscation A manual ApproachJavascript Deofuscation A manual Approach
Javascript Deofuscation A manual Approach
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Penetration testing is a field which has experienced rapid growth over the years

  • 1. Sockstressby Gregory Hanis Penetration testing is a field which has experienced rapid growth over the years, and is not going to slow down any time soon. This subject is certainly not to be entered into lightly by either the organization sponsoring the test, or the testers themselves. There are many legal issues that need to be dealt with prior to even starting the test not to mention laying down a groundwork of rules for the test such as which areas are exposed and what the procedure is comprised of. As a newcomer to penetration testing you need to understand that vulnerabilities exist in all networks, operating systems, and applications. New attacks and vulnerabilities appear constantly, and even some old and well known attacks seem to slip through the defenses of modern networks. Let’s discuss a vulnerability and attack which was introduced in 2008 by Robert E. Lee and Jack Louis, called Sockstress. Sockstress has been chosen because it is an outstanding example of a vulnerability exploitation which is well known and in most cases controlled by intrusion detection/prevention systems. Even though there are many tools available to detect and thwart this threat it still poses a danger such as in the astounding Spamhaus attack in March of 2013 (Bowne S. , 2013). Descriptions used here of the attack are by no means comprehensive, but they will give the new penetration tester a look at a small part of what goes into identifying and mitigating attacks in general. Briefly, Sockstress is a denial of service attack which consumes resources of devices that accept TCP connections. The attack itself uses a “user-land” TCP stack, or TCP stack within the application, rather than the kernel’s TCP stack. Typically it will open an arbitrary number of connections to a server and engage in the usual 3-way TCP handshake. Once the connection is established Sockstress targets specific traits of TCP in order to tax resources on the server such as timers, buffer window sizes, and memory used in the connection. Windows, Mac, Linux, and BSD are all similarly affected by the attack, with the common vector being TCP (Gibson &Laporte, 2008). With Sockstress we have a situation where implementation of the tool is difficult enough so that it is not favored by most script-kiddies, and moreover it is easy enough to mitigate. Consequently not enough people are paying attention or protecting themselves from it. Killing a server or denying services is perhaps not as profitable as other exploits in the cyber-crime world, so for the most part parties with the criminal capabilities have either not taken much interest or are preparing a large scale implementation for a later date. If there were a widely distributed tool for carrying out these attacks and the proper defenses had never been developed, perhaps there would be more cause for concern. Today’s script kiddies however enjoy working in numbers and they have the ability to make mayhem with tools that are already available. The beauty of this attack is that it does not require tremendous resources on the part of the attacker- a small herd of bots is able to tie up enough resources over time to bring down a server. As each connection is made server resources are committed to that socket or connection. Each zombie computer continues to establish connections and subversively chew up resources such as RAM. Rather than flooding the server this attack allows resource degradation rather than connection volume to bring down a server. In August of this year, Sam Bowne displayed a great example of Sockstress in action at the BSides Las Vegas conference (Bowne, S. 2013).
  • 2. Sockstressby Gregory Hanis It is important to note that this attack can be performed by a single machine, or a small number of machines. All the attacker needs to supply is different IP addresses in order to mask how many endpoints are performing the attack. Using a set of zombie computers is a better method of attack though, because the endpoints can come from different geographic locations. These connections appear as though they are coming from valid clients to the server, making life difficult for the intrusion detection systems being used. By no means does that mean there is no defense to the attack. Tools available to block this attack include those that block IP addresses, or limit how many connections can be made from a specific IP address. Cisco suggests mitigation by “allowing only trusted sources to access TCP based services” (Cisco, 2009). Whitelisting in this way is not feasible with publicly facing servers though. Red Hat recommends “limit the number of new connections over a time period” (redhat, 2013). Set connection rules to check if there are more than 10 TCP connections to a port over a given time, suggested at one minute. This gives a connection rate limit rather than a concurrent connection limit. Red Hat also suggests that once it is evident that you are under attack block the offensive IP(s). Mitigation will be based on a case by case basis, but repetitive zero or low value windows set on connections will give a good indication that your service is at risk (redhat, 2013). One method of supporting detection of this type of attack is to keep track of connections which are consistently giving TCP zero window, or low value window returns. The trouble is in false positives. Client connections may be slow, or routers along the path of the transmission may have full buffers forcing a real client to invoke TCP's flow control mechanisms, which may make them fit the profile of an attacker. Connections which have the heuristic or behavioral traits of a Sockstress attack may have to be dropped forcing the client to reconnect, degrading QoS. Repetitive reconnection attempts from an IP address with zero or low value windows can be forced to wait for a time between connections, or perhaps even be blacklisted to prevent further trouble from that IP. Also, track and monitor system resource usage such as RAM on the server. As the Sockstress clients connect and tell the server to hold the connection data, the server's RAM usage will gradually start to ramp up based on how many connections are being made. As the RAM usage increases to a threshold level, stale connections which are just dithering should be shed reducing resource load. This can still have a negative impact on QoS. Connections dropped must be algorithmically compared against what is deemed as a productive connection, hopefully preventing false positives in which too many real clients lose the service. After reading this brief description of an attack it should be evident that penetration testing is no laughing matter. The Spamhaus attack mentioned above has been given light treatment here, but was actually a remarkably effective attack that had a rippling effect through the Internet which even affected the London Internet Exchange (LINX) (Dunn, 2013). Also it is evident that there are many reasons to commit or solicit penetration tests. Having a penetration test might have found the vulnerabilities at Spamhaus - if it had been discovered. Another reason to acquire solid pen testing services is to ensure that organizations such as service providers comply with safeguards imposed by regulatory compliance, contracts, and service level agreements. These will require various types of insurance that the services provided are secure and interests are
  • 3. Sockstressby Gregory Hanis protected. Penetration testing provides proof of due diligence on the part of the organization or service provider, lending more than a modicum of legal protection. As a field of employment penetration testing is not going to see reductions for its need across all industries; quite the opposite will surely be true. As new vulnerabilities continue to be found and crafty thieves create new tools and attacks the need for network hardening is only going to increase and become more valuable. References Bowne, S. (2013, August 5). BSidesLV 2013 cookie reusesambowne. Retrieved from youtube.com: https://www.youtube.com/watch?v=AJs-_HhOku0 Bowne, S. (2013).Evil Dos attacks and strong defenses. Retrieved from samsclass.info: http://samsclass.info/seminars/defcon21-cfp.htm Cisco. (2009, September 9). Cisco response to outpost24 TCP state table manipulation denial of service vulnerabilities. Retrieved from cisco.com: http://www.cisco.com/en/US/products/csr/cisco-sr20081017-tcp.html Dunn, J. (2013, September 30). British teen accused of massive spamhausDDoS attack arrested months ago. Retrieved from techworld.com: http://news.techworld.com/security/3471224/british-teenaccused-of-massive-spamhaus-ddos-attack-arrested-months-ago/ Gibson, S., &Laporte, L. (2008, October 2). Sockstress; security now! episode 164 transcript.Retrieved from grc.com: https://www.grc.com/sn/sn-164.htm redhat. (2013, August 05). Does CVE-2008-4609 affect Red Hat Enterprise Linux? Retrieved from redhat.com: https://access.redhat.com/site/solutions/18729