SlideShare a Scribd company logo
DOS ATTACKS
USING
SLOWLORIS
V RAMAN TEJA
DOS ATTACKS
USING
SLOWLORIS
V RAMAN TEJA
About me!
 Security Enthusiast
 Graphic & Web Designer
 Entrepreneur
 Engineering in the making
 CISE v 2.0
 Security Enthusiast
 Graphic & Web Designer
 Entrepreneur
 Engineering in the making
 CISE v 2.0
Topics
 Dos Attacks – A general description
 Slowloris – Denial of Service – Stops Apache Web
servers
 Other Dos Attacks
 Dos Attacks – A general description
 Slowloris – Denial of Service – Stops Apache Web
servers
 Other Dos Attacks
Denial Of Service Attacks
Types of Dos Attacks
 There is a variety of forms aiming at a variety of services:
 Traffic consuming attacks or Network Layer Attacks(DNS,
firewall, router, load balancer, OS, etc.)
 Application Layer attacks (web server, media server,
mail server)
 There is a variety of forms aiming at a variety of services:
 Traffic consuming attacks or Network Layer Attacks(DNS,
firewall, router, load balancer, OS, etc.)
 Application Layer attacks (web server, media server,
mail server)
Network Layer attacks
HTTP GET
Application Layer attacks
Application Layer DoS attacks
Slow HTTP headers attack (a.k.a. Slowloris)
Slow HTTP message body attack (a.k.a Slow Post)
Slow read HTTP attack (a.k.a. TCP Persist Timer exploit)
Slow HTTP headers attack (a.k.a. Slowloris)
Slow HTTP message body attack (a.k.a Slow Post)
Slow read HTTP attack (a.k.a. TCP Persist Timer exploit)
What is low-bandwidth attack?
Mbps/secMbps/sec
Seconds
What is common?
 All mentioned attacks aim at draining the pool
of concurrent connections (usually relatively
small)
HyperText Transfer Protocol (HTTP)
Message syntax
Per RFC 2616
 generic-message = start-line
 *(message-header CRLF)
 CRLF
 [ message-body ]
 start-line = Request-Line | Status-Line
Per RFC 2616
 generic-message = start-line
 *(message-header CRLF)
 CRLF
 [ message-body ]
 start-line = Request-Line | Status-Line
HyperText Transfer Protocol (HTTP)
Message example
 GET /page.htm HTTP/1.1CRLF
 Host: www.example.com:8080CRLF
 Content-Length: 25CRLF
 CRLF
 Optional Message Body
 GET /page.htm HTTP/1.1CRLF
 Host: www.example.com:8080CRLF
 Content-Length: 25CRLF
 CRLF
 Optional Message Body
SEND INCOMPLETE HTTP REQUESTS
 Apache has a queue of approx. 256 requests
 Each one waits approx. 400 seconds by default for
the request to complete
 So less than one packet per second is enough to
occupy them all
 Which means Low-bandwidth DoS and no collateral
damage!
 Apache has a queue of approx. 256 requests
 Each one waits approx. 400 seconds by default for
the request to complete
 So less than one packet per second is enough to
occupy them all
 Which means Low-bandwidth DoS and no collateral
damage!
Slowloris
Slowloris
 Low bandwidth attack that sends HTTP requests with
incomplete headers. It continues to send headers at
regular intervals to keep the sockets active
 First mentioned by Adrian Ilarion Ciobanu in 2007
and implemeted by Robert Hansen in 2009
 Low bandwidth attack that sends HTTP requests with
incomplete headers. It continues to send headers at
regular intervals to keep the sockets active
 First mentioned by Adrian Ilarion Ciobanu in 2007
and implemeted by Robert Hansen in 2009
How slowloris works
GET / HTTP/1.1rn
Host: vulnerable-server.com:80rn
X-sadwqeq: dfg4t3rn
X-4rete: fdsgvryrn
59 seconds later
X-4rete: fdsgvryrn
X-4rete: fdsgvryrn
X-egyr7j: 8ihrn
59 seconds later
59 seconds later
Client Server
Demonstration
Slow POST
 Attack that sends HTTP requests with complete
headers but incomplete message body. There will
be no delay in HTTP header. Continues to send
data at regular intervals to keep the sockets
active
 Nullifies IIS internal defence.
 Discovered by Wong Onn Chee and popularized
by Tom Brennan in 2009
 Attack that sends HTTP requests with complete
headers but incomplete message body. There will
be no delay in HTTP header. Continues to send
data at regular intervals to keep the sockets
active
 Nullifies IIS internal defence.
 Discovered by Wong Onn Chee and popularized
by Tom Brennan in 2009
How Slow POST works
POST / HTTP/1.1rnHost: vulnerable-server.com:80rn
Content-Length: 4096rn
Content-Type: application/x-www-form-urlencodedrn
59 seconds later
rn
foo=barrn
&Owkuvj5=POaLLIrn
&uWat9wGqrP4SxV=SN3qrn
59 seconds later
59 seconds later
59 seconds later
...
Client Server
Slow Read
 Attack that keeps server sockets busy by maliciously
throttling down the receipt of large HTTP responses
 Uses known Network Layer flaws to aim Application Layer
 First mentioned by Outpost24 in sockstress. Implemented
as part of nkiller2 by Fotis Hantzis, a.k.a. ithilgore in
2009
 Attack that keeps server sockets busy by maliciously
throttling down the receipt of large HTTP responses
 Uses known Network Layer flaws to aim Application Layer
 First mentioned by Outpost24 in sockstress. Implemented
as part of nkiller2 by Fotis Hantzis, a.k.a. ithilgore in
2009
Related TCP details
“Window size (16 bits) – the size of the receive
window, which specifies the number of bytes (beyond
the sequence number in the acknowledgment field)
that the sender of this segment is currently willing to
receive” – Wikipedia
“Window size (16 bits) – the size of the receive
window, which specifies the number of bytes (beyond
the sequence number in the acknowledgment field)
that the sender of this segment is currently willing to
receive” – Wikipedia
How Slow Read works
bigpage.html
Client ServerGET bigpage.html HTTP/1.1rn
Host: vulnerable-server.com:80rnrn
BTW, my recv window is only 32 bytes
HTTP/1.1 200 OKrn
Content-Length: 131072rn
Content-type: text/htmlrnrn message
Recvbuffer
Sendbuffer
bigpage.html
HTTP/1.1 200 OKrn
Content-Length: 131072rn
Content-type: text/htmlrnrn messageKernel to app: I can send only 32 bytes now
Got it, wait for now (ACK window 0)
9090
Are you ready to receive more bytes?
OK, give me another 32 bytes
Prerequisites for successful Slow
Read attack
 The larger server response is - increasing the chances of
prolonging the connection
 make server generate a data stream that doesn't fully fit
into socket's send buffer (65536 bytes is default on most
Linux systems /proc/sys/net/ipv4/tcp_wmem, if server
doesn't set its own value)
 Request large resource by naturally finding it and/or
amplifying the response size by using HTTP pipelining.
 The larger server response is - increasing the chances of
prolonging the connection
 make server generate a data stream that doesn't fully fit
into socket's send buffer (65536 bytes is default on most
Linux systems /proc/sys/net/ipv4/tcp_wmem, if server
doesn't set its own value)
 Request large resource by naturally finding it and/or
amplifying the response size by using HTTP pipelining.
time
Why is Slow Read different?
Traditional (slowloris/slowpost) DoS
 Customer stuck deciding
what he wants
 Makes an order
 Pays
 Takes the order
 Next!
It is possible to identify and isolate
slow client in his request state
 Customer stuck deciding
what he wants
 Makes an order
 Pays
 Takes the order
 Next!
It is possible to identify and isolate
slow client in his request state
Why Slow Read is different?
Slow Read DoS
 Makes an order for
party of 50
 Pays
 Cannot take the
entire order with him,
makes several trips
to the car.
 Next!
it is quite late to do anything, as
the request was already accepted
and processed
 Makes an order for
party of 50
 Pays
 Cannot take the
entire order with him,
makes several trips
to the car.
 Next!
Why is Slow Read different?
 Makes an order for
party of 50
 Pays
 Cannot take the
entire order with him,
makes several trips to
the car
 Next!
Customer stuck deciding
what he wants Makes an
order & Pays Takes the
order Next!
 Makes an order for
party of 50
 Pays
 Cannot take the
entire order with him,
makes several trips to
the car
 Next!
Why is Slow Read different? (contd..)
 Defense mechanisms expect the crushing fist of malice to
appear in the request
 Instead, the entire transaction should be monitored
 Defense mechanisms expect the crushing fist of malice to
appear in the request
 Instead, the entire transaction should be monitored
 There is a good chance that you are. Default
configurations of nginx, lighttpd, IIS, Apache, Varnish
cache proxy, Shoutcast streaming server - are vulnerable
to at least one of the mentioned attacks
Am I vulnerable?
 There is a good chance that you are. Default
configurations of nginx, lighttpd, IIS, Apache, Varnish
cache proxy, Shoutcast streaming server - are vulnerable
to at least one of the mentioned attacks
 Use available tools to simulate attacks. SlowHTTPTest
covers all mentioned attacks and some more at
http://slowhttptest.googlecode.com
 Check out http://slowhammer.me to get access to your
own whitehat botnet in the cloud
 Use Qualys WAF or other firewalls that are supposed to
protect, but test before you pay!
What should I do?
 Use available tools to simulate attacks. SlowHTTPTest
covers all mentioned attacks and some more at
http://slowhttptest.googlecode.com
 Check out http://slowhammer.me to get access to your
own whitehat botnet in the cloud
 Use Qualys WAF or other firewalls that are supposed to
protect, but test before you pay!
Detection and Mitigation
 Drop connections with abnormally small TCP advertised
window(s) (i.e. <<16bits)
 Set an absolute connection timeout, if possible
 Limit length, number of headers to accept
 Limit max size of message body to accept
 Drop connections with HTTP methods (verbs) not supported
by the URL
 Limit accepted header and message body to a minimal
reasonable length
 Define the minimum data rate, and drop connections that
are slower than that rate
 Drop connections with abnormally small TCP advertised
window(s) (i.e. <<16bits)
 Set an absolute connection timeout, if possible
 Limit length, number of headers to accept
 Limit max size of message body to accept
 Drop connections with HTTP methods (verbs) not supported
by the URL
 Limit accepted header and message body to a minimal
reasonable length
 Define the minimum data rate, and drop connections that
are slower than that rate
Detection and Mitigation
 Qualys Web Application Scanner passively detects the
slow attack vulnerabilities
 ModSecurity v2.6 introduced a directive called
SecWriteStateLimit that places a time limit on the
concurrent number of threads (per IP address)
 Snort is working on detecting connections with small TCP
advertised window(s)
 Christian Folini introduced Flying Frog script at
https://www.netnea.com
 Qualys Web Application Scanner passively detects the
slow attack vulnerabilities
 ModSecurity v2.6 introduced a directive called
SecWriteStateLimit that places a time limit on the
concurrent number of threads (per IP address)
 Snort is working on detecting connections with small TCP
advertised window(s)
 Christian Folini introduced Flying Frog script at
https://www.netnea.com
Example of misconfiguration
OSI Model- a new approach
OSI Model DoS Attack
7 Application Slowloris – Incomplete HTTP Requests
6 Presentation
5 Session5 Session
4 Transport SYN Flood – Incomplete TCP Handshakes
3 Network HTTP GET/POST Flood
2 Data Link
1 Physical Cut a cable
A few more Attacks!A few more Attacks!
“the sky is falling.... but we cannot tell you why”
The new TCP DoS attacks
Source: news.softpedia.com
The “new” TCP DoS attacks
 During 2008, the discovery of some (supposedly)
new vulnerabilities received their share of press.
 They were “announced” by Outpost24, but no
details were provided – thus resulting in speculation
by the community.
 No counter-measures were proposed to vendors,
either.
 While not publicly credited for our work, we
provided advice to vendors on these issues.
 During 2008, the discovery of some (supposedly)
new vulnerabilities received their share of press.
 They were “announced” by Outpost24, but no
details were provided – thus resulting in speculation
by the community.
 No counter-measures were proposed to vendors,
either.
 While not publicly credited for our work, we
provided advice to vendors on these issues.
The “new” TCP DoS attacks
 For the most part, the vulnerabilities are:
 Connection-flooding attacks (Naphta and FIN-WAIT-2
flooding attacks)
 Socket send buffer attacks (Netkill and closed windows)
 TCP reassembly buffer attacks
 For the most part, the vulnerabilities are:
 Connection-flooding attacks (Naphta and FIN-WAIT-2
flooding attacks)
 Socket send buffer attacks (Netkill and closed windows)
 TCP reassembly buffer attacks
Some insights on the recent TCP DoS
vulnerabilities
Some insights on the recent TCP DoS
vulnerabilities
Connection-flooding attacks
(Naphta and FIN-WAIT-2)
Connection-flooding attacks
(Naphta and FIN-WAIT-2)
Naphta (connection-flooding
attack)
 TCP connections require end-points to keep state (in
system memory) for the connections.
 Memory is a limited resource, and thus can be
targeted for exhaustion: simply establish lots of
connections with the target system.
 This attack vector was known as “Naphta” -- see
CERT Advisory CA-2000-21.
 To avoid exhausting his own resources simply crafts
the required packets to establish TCP connections
with the target system, thus bypassing its kernel
implementation of TCP.
 TCP connections require end-points to keep state (in
system memory) for the connections.
 Memory is a limited resource, and thus can be
targeted for exhaustion: simply establish lots of
connections with the target system.
 This attack vector was known as “Naphta” -- see
CERT Advisory CA-2000-21.
 To avoid exhausting his own resources simply crafts
the required packets to establish TCP connections
with the target system, thus bypassing its kernel
implementation of TCP.
Naptha attack (example)
Countermeasures for Naphta
 Key problem: an actual attack does not necessarily
differ from a high-load scenario
 Possible counter-measures:
 Enforce per-user and pre-process limits
 Enforce limits on the number of ongoing connections
from a single system/prefix at the application-layer
 Enforce limits on the number of ongoing connections
from a single system/prefix at a firewall
 Key problem: an actual attack does not necessarily
differ from a high-load scenario
 Possible counter-measures:
 Enforce per-user and pre-process limits
 Enforce limits on the number of ongoing connections
from a single system/prefix at the application-layer
 Enforce limits on the number of ongoing connections
from a single system/prefix at a firewall
 A typical connection-termination scenario:
FIN-WAIT-2 flooding attack
 A typical connection-termination scenario:
FIN-WAIT-2 flooding attack
 Problems that may arise due to the FIN-WAIT-2
state
 There’s no limit on the amount of time a connection can
stay in the FIN-WAIT-2 state – connections could stay
forever in FIN-WAIT-2.
 When TCP gets into the FIN-WAIT-2 state there’s no
user-space controlling process (i.e., it’s hard to enforce
application-layer limits)
 Problems that may arise due to the FIN-WAIT-2
state
 There’s no limit on the amount of time a connection can
stay in the FIN-WAIT-2 state – connections could stay
forever in FIN-WAIT-2.
 When TCP gets into the FIN-WAIT-2 state there’s no
user-space controlling process (i.e., it’s hard to enforce
application-layer limits)
FIN-WAIT-2 attack (example)
Counter-measures for FIN-WAIT-2
flooding
 Enforce a limit on the duration of the FIN-WAIT-2
state. E.g., Linux 2.4 enforces a limit of 60 seconds.
Once that limit is reached, the connection is
aborted.
 Enforce on the number of ongoing connections with
no controlling process.
 The counter-measures for the Naptha attack still
apply. However, it is difficult for applications to
enforce limits (remember: no controlling process for
the connections).
 Enforce a limit on the duration of the FIN-WAIT-2
state. E.g., Linux 2.4 enforces a limit of 60 seconds.
Once that limit is reached, the connection is
aborted.
 Enforce on the number of ongoing connections with
no controlling process.
 The counter-measures for the Naptha attack still
apply. However, it is difficult for applications to
enforce limits (remember: no controlling process for
the connections).
Counter-measures for FIN-WAIT-2
flooding
 Applications should be modified so that they retain
control of the connection for most states. This can be
achieved with a conbination of the shutdown(),
setsockopt(), and close().
 Applications should be modified so that they retain
control of the connection for most states. This can be
achieved with a conbination of the shutdown(),
setsockopt(), and close().
Socket send buffer vulnerabilities
 The socket send buffer keeps a copy of those data
that have been accepted by TCP for delivery to the
remote TCP end-point.
 It is possible to exploit the Socket send buffer for a
memory exhaustion attack:
 Send an application request to the target system, but
never acknowledge the response (Netkill).
 Send an application request, but immediately close the
receive window, so that the target TCP refrains from
actually sending the response.
 The socket send buffer keeps a copy of those data
that have been accepted by TCP for delivery to the
remote TCP end-point.
 It is possible to exploit the Socket send buffer for a
memory exhaustion attack:
 Send an application request to the target system, but
never acknowledge the response (Netkill).
 Send an application request, but immediately close the
receive window, so that the target TCP refrains from
actually sending the response.
Netkill
 Data that have been sent but not yet acknowledged
are kept in the socket send buffer for their possible
retransmission.
 TCP will retransmit those data until they either get
acknowledged or the connection times out. In the
mean time, system memory is tied to those data.
 Easy to exploit for memory exhaustion: establish lots
of TCP connections, send an applicattion-request on
each of them, and never acknowledge the received
data.
 Data that have been sent but not yet acknowledged
are kept in the socket send buffer for their possible
retransmission.
 TCP will retransmit those data until they either get
acknowledged or the connection times out. In the
mean time, system memory is tied to those data.
 Easy to exploit for memory exhaustion: establish lots
of TCP connections, send an applicattion-request on
each of them, and never acknowledge the received
data.
Netkill (example)
Netkill (countermeasures)
 Problem: it’s very hard to infer attack from the
behavior of a single connection.
 Possible counter-measures:
 Measure connection progress at the application-
layer
 Do not use an unnecessarily large socket send
buffer
 Enforce per-user and pre-process limits
 Enforce limits on the number of ongoing connections
from a single system/prefix at the application-
layer
 Problem: it’s very hard to infer attack from the
behavior of a single connection.
 Possible counter-measures:
 Measure connection progress at the application-
layer
 Do not use an unnecessarily large socket send
buffer
 Enforce per-user and pre-process limits
 Enforce limits on the number of ongoing connections
from a single system/prefix at the application-
layer
Netkill(countermeasures)
 Enforce limits on the number of on-going connections
from a single system/prefix at a firewall
 When dropping connection, these are possible parameters
that may provide hints for selecting the target connection:
 Large amount of data queued in the TCP retransmission
buffer
 Small amount of data successfully transferred to the
remote endpoint
 Enforce limits on the number of on-going connections
from a single system/prefix at a firewall
 When dropping connection, these are possible parameters
that may provide hints for selecting the target connection:
 Large amount of data queued in the TCP retransmission
buffer
 Small amount of data successfully transferred to the
remote endpoint
Closed windows
 The TCP sliding-window mechanism prevents a fast
sender from overwhelming a slow consumer
application.
 When the advertised window is zero, the window is
said to be closed.
 The TCP sender polls the receiver from time to time
to find out if the window has opened (persist timer).
However, there’s no limit on the amount of time that
the window can be closed.
 The TCP sliding-window mechanism prevents a fast
sender from overwhelming a slow consumer
application.
 When the advertised window is zero, the window is
said to be closed.
 The TCP sender polls the receiver from time to time
to find out if the window has opened (persist timer).
However, there’s no limit on the amount of time that
the window can be closed.
Closed windows
 Easy to exploit for memory exhaustion: just send an
applicattion-request to the remote end-point, and
close the receive window.
 Easy to exploit for memory exhaustion: just send an
applicattion-request to the remote end-point, and
close the receive window.
Closed windows (example)
Closed windows (countermeasures)
 Problem: it’s very hard to infer attack from the
behavior of a single connection.
 It has been proposed that TCP should impose a limit
on the amount of time that the window can be
closed. However, this counter-measure is trivial to
circumvent: just open the window a bit from time to
time.
 Problem: it’s very hard to infer attack from the
behavior of a single connection.
 It has been proposed that TCP should impose a limit
on the amount of time that the window can be
closed. However, this counter-measure is trivial to
circumvent: just open the window a bit from time to
time.
Closed windows (countermeasures)
 Measure connection progress at the application-layer
 Do not use an unnecessarily large socket send buffer
 Enforce per-user and pre-process limits
 Enforce limits on the number of ongoing connections
from a single system/prefix at the application-layer
 Enforce limits on the number of ongoing connections
from a single system/prefix at a firewall
 Measure connection progress at the application-layer
 Do not use an unnecessarily large socket send buffer
 Enforce per-user and pre-process limits
 Enforce limits on the number of ongoing connections
from a single system/prefix at the application-layer
 Enforce limits on the number of ongoing connections
from a single system/prefix at a firewall
Summary
 Even though the simplest distributed DoS
attacks are enough to knock down most web
sites today, the nature of the attack will be
sure to improve, and it’s better to be ready
or, at least be aware of upcoming problems.
 Even though the simplest distributed DoS
attacks are enough to knock down most web
sites today, the nature of the attack will be
sure to improve, and it’s better to be ready
or, at least be aware of upcoming problems.
References
 ModSecurity Advanced Topic of the Week: Mitigation of 'Slow Read" Denial of
Service Attack
 http://blog.spiderlabs.com/2012/01/modsecurity-advanced-topic-of-the-week-
mitigation-of-slow-read-denial-of-service-attack.html
 DDoS attacks in H2 2011
http://www.securelist.com/en/analysis/204792221/DDoS_attacks_in_H2_2011
 The State of the Internet
 http://www.akamai.com/stateoftheinternet/
 Evaluation of slowhttptest against servers protected by CloudFlare
 http://samsclass.info/123/proj10/slow-read.html
 Blog posts on hardening web servers
 https://community.qualys.com/blogs/securitylabs/
 ModSecurity Advanced Topic of the Week: Mitigation of 'Slow Read" Denial of
Service Attack
 http://blog.spiderlabs.com/2012/01/modsecurity-advanced-topic-of-the-week-
mitigation-of-slow-read-denial-of-service-attack.html
 DDoS attacks in H2 2011
http://www.securelist.com/en/analysis/204792221/DDoS_attacks_in_H2_2011
 The State of the Internet
 http://www.akamai.com/stateoftheinternet/
 Evaluation of slowhttptest against servers protected by CloudFlare
 http://samsclass.info/123/proj10/slow-read.html
 Blog posts on hardening web servers
 https://community.qualys.com/blogs/securitylabs/
Contact
 V Raman teja
 Network Security , Web Technologies, Graphic
Designing & Coding
 Email: venigallaramanteja@gmail.com
 Ph: 9032195562
 V Raman teja
 Network Security , Web Technologies, Graphic
Designing & Coding
 Email: venigallaramanteja@gmail.com
 Ph: 9032195562

More Related Content

What's hot

Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Rob Fuller
 
NotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for Pentesters
Rob Fuller
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
thaidn
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
Christopher Grayson
 
ZN27112015
ZN27112015ZN27112015
ZN27112015
Denis Kolegov
 
A @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSA @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNS
Rob Fuller
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
OpenDNS
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Dan Kaminsky
 
第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう
Tatsuya Tobioka
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
Ryan Ellingson
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
Dan Kaminsky
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
Sukbum Hong
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
jgrahamc
 
DNS Cache Poisoning
DNS Cache PoisoningDNS Cache Poisoning
DNS Cache Poisoning
Christiaan Ottow
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
OpenDNS
 
how to use fiddler (Ver eng)
how to use fiddler (Ver eng)how to use fiddler (Ver eng)
how to use fiddler (Ver eng)
용진 조
 
Developing the fastest HTTP/2 server
Developing the fastest HTTP/2 serverDeveloping the fastest HTTP/2 server
Developing the fastest HTTP/2 server
Kazuho Oku
 
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan YorkION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
Deploy360 Programme (Internet Society)
 
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Chanaka Lasantha
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sight
Rob Gillen
 

What's hot (20)

Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
NotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for PentestersNotaCon 2011 - Networking for Pentesters
NotaCon 2011 - Networking for Pentesters
 
DDoS Attacks and Countermeasures
DDoS Attacks and CountermeasuresDDoS Attacks and Countermeasures
DDoS Attacks and Countermeasures
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
 
ZN27112015
ZN27112015ZN27112015
ZN27112015
 
A @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNSA @textfiles approach to gathering the world's DNS
A @textfiles approach to gathering the world's DNS
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
 
第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう第0回ワススタ!! #wasbookを読もう
第0回ワススタ!! #wasbookを読もう
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
How to launch and defend against a DDoS
How to launch and defend against a DDoSHow to launch and defend against a DDoS
How to launch and defend against a DDoS
 
DNS Cache Poisoning
DNS Cache PoisoningDNS Cache Poisoning
DNS Cache Poisoning
 
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
 
how to use fiddler (Ver eng)
how to use fiddler (Ver eng)how to use fiddler (Ver eng)
how to use fiddler (Ver eng)
 
Developing the fastest HTTP/2 server
Developing the fastest HTTP/2 serverDeveloping the fastest HTTP/2 server
Developing the fastest HTTP/2 server
 
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan YorkION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
 
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
Configuring apache, php, my sql, ftp, ssl, ip tables phpmyadmin and server mo...
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sight
 

Viewers also liked

An inside look at Skynet, a Tor based botnet
An inside look at Skynet, a Tor based botnetAn inside look at Skynet, a Tor based botnet
An inside look at Skynet, a Tor based botnet
sr1nu
 
Почему не работает Wi-Fi? Ошибки при проектировании сети
Почему не работает Wi-Fi? Ошибки при проектировании сетиПочему не работает Wi-Fi? Ошибки при проектировании сети
Почему не работает Wi-Fi? Ошибки при проектировании сети
SkillFactory
 
Защита сайта от взлома и вирусов
Защита сайта от взлома и вирусовЗащита сайта от взлома и вирусов
Защита сайта от взлома и вирусов
SkillFactory
 
Пять секретов оптимальной настройки цифровой АТС Cisco UCM
Пять секретов оптимальной настройки цифровой АТС Cisco UCMПять секретов оптимальной настройки цифровой АТС Cisco UCM
Пять секретов оптимальной настройки цифровой АТС Cisco UCM
SkillFactory
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
Raleigh ISSA
 
DDoS Defence 101
DDoS Defence 101DDoS Defence 101
DDoS Defence 101
Qrator Labs
 
Yac2013 lyamin-ddos
Yac2013 lyamin-ddosYac2013 lyamin-ddos
Yac2013 lyamin-ddos
Alexander Lyamin
 
DDoS-­атаки: почему они возможны, и как их предотвращать
 DDoS-­атаки: почему они возможны, и как их предотвращать DDoS-­атаки: почему они возможны, и как их предотвращать
DDoS-­атаки: почему они возможны, и как их предотвращать
Qrator Labs
 
Антон Карпов - Сетевая безопасность
 Антон Карпов - Сетевая безопасность Антон Карпов - Сетевая безопасность
Антон Карпов - Сетевая безопасностьYandex
 
Правила успешной карьеры в IT. Часть 2. Взгляд HR-отдела
Правила успешной карьеры в IT. Часть 2. Взгляд HR-отделаПравила успешной карьеры в IT. Часть 2. Взгляд HR-отдела
Правила успешной карьеры в IT. Часть 2. Взгляд HR-отдела
SkillFactory
 
Варианты решений для подключения мобильных устройств
Варианты решений для подключения мобильных устройствВарианты решений для подключения мобильных устройств
Варианты решений для подключения мобильных устройств
SkillFactory
 
Технология операторов связи DWDM: все самое важное за 1 вебинар
Технология операторов связи DWDM: все самое важное за 1 вебинарТехнология операторов связи DWDM: все самое важное за 1 вебинар
Технология операторов связи DWDM: все самое важное за 1 вебинар
SkillFactory
 
MX – универсальная сервисная платформа. Вчера, сегодня, завтра.
MX – универсальная сервисная платформа. Вчера, сегодня, завтра.MX – универсальная сервисная платформа. Вчера, сегодня, завтра.
MX – универсальная сервисная платформа. Вчера, сегодня, завтра.
SkillFactory
 
Вопросы балансировки трафика
Вопросы балансировки трафикаВопросы балансировки трафика
Вопросы балансировки трафика
SkillFactory
 
End to End Convergence
End to End ConvergenceEnd to End Convergence
End to End Convergence
SkillFactory
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
Radware
 
IP/LDP fast protection schemes
IP/LDP fast protection schemesIP/LDP fast protection schemes
IP/LDP fast protection schemes
SkillFactory
 
Oig 14 19-dec13 report on eb5 program
Oig 14 19-dec13 report on eb5 programOig 14 19-dec13 report on eb5 program
Oig 14 19-dec13 report on eb5 program
James Lavigne
 
Nomadic Display Set Up HangTen
Nomadic Display Set Up HangTenNomadic Display Set Up HangTen
Nomadic Display Set Up HangTen
Nomadic Display
 
Null July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj MachirajuNull July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj Machiraju
Raghunath G
 

Viewers also liked (20)

An inside look at Skynet, a Tor based botnet
An inside look at Skynet, a Tor based botnetAn inside look at Skynet, a Tor based botnet
An inside look at Skynet, a Tor based botnet
 
Почему не работает Wi-Fi? Ошибки при проектировании сети
Почему не работает Wi-Fi? Ошибки при проектировании сетиПочему не работает Wi-Fi? Ошибки при проектировании сети
Почему не работает Wi-Fi? Ошибки при проектировании сети
 
Защита сайта от взлома и вирусов
Защита сайта от взлома и вирусовЗащита сайта от взлома и вирусов
Защита сайта от взлома и вирусов
 
Пять секретов оптимальной настройки цифровой АТС Cisco UCM
Пять секретов оптимальной настройки цифровой АТС Cisco UCMПять секретов оптимальной настройки цифровой АТС Cisco UCM
Пять секретов оптимальной настройки цифровой АТС Cisco UCM
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
DDoS Defence 101
DDoS Defence 101DDoS Defence 101
DDoS Defence 101
 
Yac2013 lyamin-ddos
Yac2013 lyamin-ddosYac2013 lyamin-ddos
Yac2013 lyamin-ddos
 
DDoS-­атаки: почему они возможны, и как их предотвращать
 DDoS-­атаки: почему они возможны, и как их предотвращать DDoS-­атаки: почему они возможны, и как их предотвращать
DDoS-­атаки: почему они возможны, и как их предотвращать
 
Антон Карпов - Сетевая безопасность
 Антон Карпов - Сетевая безопасность Антон Карпов - Сетевая безопасность
Антон Карпов - Сетевая безопасность
 
Правила успешной карьеры в IT. Часть 2. Взгляд HR-отдела
Правила успешной карьеры в IT. Часть 2. Взгляд HR-отделаПравила успешной карьеры в IT. Часть 2. Взгляд HR-отдела
Правила успешной карьеры в IT. Часть 2. Взгляд HR-отдела
 
Варианты решений для подключения мобильных устройств
Варианты решений для подключения мобильных устройствВарианты решений для подключения мобильных устройств
Варианты решений для подключения мобильных устройств
 
Технология операторов связи DWDM: все самое важное за 1 вебинар
Технология операторов связи DWDM: все самое важное за 1 вебинарТехнология операторов связи DWDM: все самое важное за 1 вебинар
Технология операторов связи DWDM: все самое важное за 1 вебинар
 
MX – универсальная сервисная платформа. Вчера, сегодня, завтра.
MX – универсальная сервисная платформа. Вчера, сегодня, завтра.MX – универсальная сервисная платформа. Вчера, сегодня, завтра.
MX – универсальная сервисная платформа. Вчера, сегодня, завтра.
 
Вопросы балансировки трафика
Вопросы балансировки трафикаВопросы балансировки трафика
Вопросы балансировки трафика
 
End to End Convergence
End to End ConvergenceEnd to End Convergence
End to End Convergence
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
IP/LDP fast protection schemes
IP/LDP fast protection schemesIP/LDP fast protection schemes
IP/LDP fast protection schemes
 
Oig 14 19-dec13 report on eb5 program
Oig 14 19-dec13 report on eb5 programOig 14 19-dec13 report on eb5 program
Oig 14 19-dec13 report on eb5 program
 
Nomadic Display Set Up HangTen
Nomadic Display Set Up HangTenNomadic Display Set Up HangTen
Nomadic Display Set Up HangTen
 
Null July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj MachirajuNull July - OWTF - Bharadwaj Machiraju
Null July - OWTF - Bharadwaj Machiraju
 

Similar to Null HYD VRTDOS

Http
HttpHttp
Http
Eri Alam
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian
 
Compression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN NetworksCompression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN Networks
Priyanka Aash
 
Web server
Web serverWeb server
Web server
Nirav Daraniya
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
Viral Parmar
 
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
Alessandro Nadalin
 
Varnish Cache
Varnish CacheVarnish Cache
Varnish Cache
Mahbub E Elahi (Ron)
 
Chapter 2 - Application Layer
Chapter 2 - Application LayerChapter 2 - Application Layer
Chapter 2 - Application Layer
Andy Juan Sarango Veliz
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
webhostingguy
 
Aditya - Hacking Client Side Insecurities - ClubHack2008
Aditya - Hacking Client Side Insecurities - ClubHack2008Aditya - Hacking Client Side Insecurities - ClubHack2008
Aditya - Hacking Client Side Insecurities - ClubHack2008
ClubHack
 
Web Hacking
Web HackingWeb Hacking
Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...
Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...
Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...
Ontico
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
Nick Owen
 
gofortution
gofortutiongofortution
gofortution
gofortution
 
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
Sandro Gauci
 
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PROIDEA
 
Smuggling TCP traffic through HTTP
Smuggling TCP traffic through HTTPSmuggling TCP traffic through HTTP
Smuggling TCP traffic through HTTP
Dávid Halász
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
Rishabh Mehan
 

Similar to Null HYD VRTDOS (20)

Http
HttpHttp
Http
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
 
Hacking Client Side Insecurities
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
 
Compression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN NetworksCompression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN Networks
 
Web server
Web serverWeb server
Web server
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
 
Varnish Cache
Varnish CacheVarnish Cache
Varnish Cache
 
Chapter 2 - Application Layer
Chapter 2 - Application LayerChapter 2 - Application Layer
Chapter 2 - Application Layer
 
PowerPoint Presentation
PowerPoint PresentationPowerPoint Presentation
PowerPoint Presentation
 
Aditya - Hacking Client Side Insecurities - ClubHack2008
Aditya - Hacking Client Side Insecurities - ClubHack2008Aditya - Hacking Client Side Insecurities - ClubHack2008
Aditya - Hacking Client Side Insecurities - ClubHack2008
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...
Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...
Проксирование HTTP-запросов web-акселератором / Александр Крижановский (Tempe...
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
gofortution
gofortutiongofortution
gofortution
 
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
 
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
PLNOG 17 - Patryk Wojtachnio - DDoS mitygacja oraz ochrona sieci w środowisku...
 
Smuggling TCP traffic through HTTP
Smuggling TCP traffic through HTTPSmuggling TCP traffic through HTTP
Smuggling TCP traffic through HTTP
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 

More from Raghunath G

Securitynewsbytes
SecuritynewsbytesSecuritynewsbytes
Securitynewsbytes
Raghunath G
 
Whats app forensic
Whats app forensicWhats app forensic
Whats app forensic
Raghunath G
 
Seh based exploitation
Seh based exploitationSeh based exploitation
Seh based exploitation
Raghunath G
 
Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01
Raghunath G
 
Raspberry pi 2
Raspberry pi 2Raspberry pi 2
Raspberry pi 2
Raghunath G
 
Analysis of malicious pdf
Analysis of malicious pdfAnalysis of malicious pdf
Analysis of malicious pdf
Raghunath G
 
Mobile application security 101
Mobile application security 101Mobile application security 101
Mobile application security 101
Raghunath G
 
Security News Bytes
Security News BytesSecurity News Bytes
Security News Bytes
Raghunath G
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
Raghunath G
 
Null HYD Playing with shodan null
Null HYD Playing with shodan nullNull HYD Playing with shodan null
Null HYD Playing with shodan null
Raghunath G
 
Metasploit
MetasploitMetasploit
Metasploit
Raghunath G
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
 
Null dec 2014
Null dec 2014Null dec 2014
Null dec 2014
Raghunath G
 
Security News Bytes
Security News BytesSecurity News Bytes
Security News Bytes
Raghunath G
 
Decoy documents
Decoy documentsDecoy documents
Decoy documents
Raghunath G
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
Raghunath G
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
Raghunath G
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
Raghunath G
 
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthanXss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
Raghunath G
 
The art of_firewalking-by-sujay
The art of_firewalking-by-sujayThe art of_firewalking-by-sujay
The art of_firewalking-by-sujay
Raghunath G
 

More from Raghunath G (20)

Securitynewsbytes
SecuritynewsbytesSecuritynewsbytes
Securitynewsbytes
 
Whats app forensic
Whats app forensicWhats app forensic
Whats app forensic
 
Seh based exploitation
Seh based exploitationSeh based exploitation
Seh based exploitation
 
Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01Securitynewsbytes april2015-150418153901-conversion-gate01
Securitynewsbytes april2015-150418153901-conversion-gate01
 
Raspberry pi 2
Raspberry pi 2Raspberry pi 2
Raspberry pi 2
 
Analysis of malicious pdf
Analysis of malicious pdfAnalysis of malicious pdf
Analysis of malicious pdf
 
Mobile application security 101
Mobile application security 101Mobile application security 101
Mobile application security 101
 
Security News Bytes
Security News BytesSecurity News Bytes
Security News Bytes
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Null HYD Playing with shodan null
Null HYD Playing with shodan nullNull HYD Playing with shodan null
Null HYD Playing with shodan null
 
Metasploit
MetasploitMetasploit
Metasploit
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Null dec 2014
Null dec 2014Null dec 2014
Null dec 2014
 
Security News Bytes
Security News BytesSecurity News Bytes
Security News Bytes
 
Decoy documents
Decoy documentsDecoy documents
Decoy documents
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Netcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beemaNetcat 101 by-mahesh-beema
Netcat 101 by-mahesh-beema
 
Xss 101 by-sai-shanthan
Xss 101 by-sai-shanthanXss 101 by-sai-shanthan
Xss 101 by-sai-shanthan
 
The art of_firewalking-by-sujay
The art of_firewalking-by-sujayThe art of_firewalking-by-sujay
The art of_firewalking-by-sujay
 

Recently uploaded

Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

Null HYD VRTDOS

  • 1. DOS ATTACKS USING SLOWLORIS V RAMAN TEJA DOS ATTACKS USING SLOWLORIS V RAMAN TEJA
  • 2. About me!  Security Enthusiast  Graphic & Web Designer  Entrepreneur  Engineering in the making  CISE v 2.0  Security Enthusiast  Graphic & Web Designer  Entrepreneur  Engineering in the making  CISE v 2.0
  • 3. Topics  Dos Attacks – A general description  Slowloris – Denial of Service – Stops Apache Web servers  Other Dos Attacks  Dos Attacks – A general description  Slowloris – Denial of Service – Stops Apache Web servers  Other Dos Attacks
  • 5. Types of Dos Attacks  There is a variety of forms aiming at a variety of services:  Traffic consuming attacks or Network Layer Attacks(DNS, firewall, router, load balancer, OS, etc.)  Application Layer attacks (web server, media server, mail server)  There is a variety of forms aiming at a variety of services:  Traffic consuming attacks or Network Layer Attacks(DNS, firewall, router, load balancer, OS, etc.)  Application Layer attacks (web server, media server, mail server)
  • 9. Application Layer DoS attacks Slow HTTP headers attack (a.k.a. Slowloris) Slow HTTP message body attack (a.k.a Slow Post) Slow read HTTP attack (a.k.a. TCP Persist Timer exploit) Slow HTTP headers attack (a.k.a. Slowloris) Slow HTTP message body attack (a.k.a Slow Post) Slow read HTTP attack (a.k.a. TCP Persist Timer exploit)
  • 10. What is low-bandwidth attack? Mbps/secMbps/sec Seconds
  • 11. What is common?  All mentioned attacks aim at draining the pool of concurrent connections (usually relatively small)
  • 12. HyperText Transfer Protocol (HTTP) Message syntax Per RFC 2616  generic-message = start-line  *(message-header CRLF)  CRLF  [ message-body ]  start-line = Request-Line | Status-Line Per RFC 2616  generic-message = start-line  *(message-header CRLF)  CRLF  [ message-body ]  start-line = Request-Line | Status-Line
  • 13. HyperText Transfer Protocol (HTTP) Message example  GET /page.htm HTTP/1.1CRLF  Host: www.example.com:8080CRLF  Content-Length: 25CRLF  CRLF  Optional Message Body  GET /page.htm HTTP/1.1CRLF  Host: www.example.com:8080CRLF  Content-Length: 25CRLF  CRLF  Optional Message Body
  • 14. SEND INCOMPLETE HTTP REQUESTS  Apache has a queue of approx. 256 requests  Each one waits approx. 400 seconds by default for the request to complete  So less than one packet per second is enough to occupy them all  Which means Low-bandwidth DoS and no collateral damage!  Apache has a queue of approx. 256 requests  Each one waits approx. 400 seconds by default for the request to complete  So less than one packet per second is enough to occupy them all  Which means Low-bandwidth DoS and no collateral damage!
  • 16. Slowloris  Low bandwidth attack that sends HTTP requests with incomplete headers. It continues to send headers at regular intervals to keep the sockets active  First mentioned by Adrian Ilarion Ciobanu in 2007 and implemeted by Robert Hansen in 2009  Low bandwidth attack that sends HTTP requests with incomplete headers. It continues to send headers at regular intervals to keep the sockets active  First mentioned by Adrian Ilarion Ciobanu in 2007 and implemeted by Robert Hansen in 2009
  • 17. How slowloris works GET / HTTP/1.1rn Host: vulnerable-server.com:80rn X-sadwqeq: dfg4t3rn X-4rete: fdsgvryrn 59 seconds later X-4rete: fdsgvryrn X-4rete: fdsgvryrn X-egyr7j: 8ihrn 59 seconds later 59 seconds later Client Server
  • 19. Slow POST  Attack that sends HTTP requests with complete headers but incomplete message body. There will be no delay in HTTP header. Continues to send data at regular intervals to keep the sockets active  Nullifies IIS internal defence.  Discovered by Wong Onn Chee and popularized by Tom Brennan in 2009  Attack that sends HTTP requests with complete headers but incomplete message body. There will be no delay in HTTP header. Continues to send data at regular intervals to keep the sockets active  Nullifies IIS internal defence.  Discovered by Wong Onn Chee and popularized by Tom Brennan in 2009
  • 20. How Slow POST works POST / HTTP/1.1rnHost: vulnerable-server.com:80rn Content-Length: 4096rn Content-Type: application/x-www-form-urlencodedrn 59 seconds later rn foo=barrn &Owkuvj5=POaLLIrn &uWat9wGqrP4SxV=SN3qrn 59 seconds later 59 seconds later 59 seconds later ... Client Server
  • 21. Slow Read  Attack that keeps server sockets busy by maliciously throttling down the receipt of large HTTP responses  Uses known Network Layer flaws to aim Application Layer  First mentioned by Outpost24 in sockstress. Implemented as part of nkiller2 by Fotis Hantzis, a.k.a. ithilgore in 2009  Attack that keeps server sockets busy by maliciously throttling down the receipt of large HTTP responses  Uses known Network Layer flaws to aim Application Layer  First mentioned by Outpost24 in sockstress. Implemented as part of nkiller2 by Fotis Hantzis, a.k.a. ithilgore in 2009
  • 22. Related TCP details “Window size (16 bits) – the size of the receive window, which specifies the number of bytes (beyond the sequence number in the acknowledgment field) that the sender of this segment is currently willing to receive” – Wikipedia “Window size (16 bits) – the size of the receive window, which specifies the number of bytes (beyond the sequence number in the acknowledgment field) that the sender of this segment is currently willing to receive” – Wikipedia
  • 23. How Slow Read works bigpage.html Client ServerGET bigpage.html HTTP/1.1rn Host: vulnerable-server.com:80rnrn BTW, my recv window is only 32 bytes HTTP/1.1 200 OKrn Content-Length: 131072rn Content-type: text/htmlrnrn message Recvbuffer Sendbuffer bigpage.html HTTP/1.1 200 OKrn Content-Length: 131072rn Content-type: text/htmlrnrn messageKernel to app: I can send only 32 bytes now Got it, wait for now (ACK window 0) 9090 Are you ready to receive more bytes? OK, give me another 32 bytes
  • 24. Prerequisites for successful Slow Read attack  The larger server response is - increasing the chances of prolonging the connection  make server generate a data stream that doesn't fully fit into socket's send buffer (65536 bytes is default on most Linux systems /proc/sys/net/ipv4/tcp_wmem, if server doesn't set its own value)  Request large resource by naturally finding it and/or amplifying the response size by using HTTP pipelining.  The larger server response is - increasing the chances of prolonging the connection  make server generate a data stream that doesn't fully fit into socket's send buffer (65536 bytes is default on most Linux systems /proc/sys/net/ipv4/tcp_wmem, if server doesn't set its own value)  Request large resource by naturally finding it and/or amplifying the response size by using HTTP pipelining. time
  • 25. Why is Slow Read different? Traditional (slowloris/slowpost) DoS  Customer stuck deciding what he wants  Makes an order  Pays  Takes the order  Next! It is possible to identify and isolate slow client in his request state  Customer stuck deciding what he wants  Makes an order  Pays  Takes the order  Next! It is possible to identify and isolate slow client in his request state
  • 26. Why Slow Read is different? Slow Read DoS  Makes an order for party of 50  Pays  Cannot take the entire order with him, makes several trips to the car.  Next! it is quite late to do anything, as the request was already accepted and processed  Makes an order for party of 50  Pays  Cannot take the entire order with him, makes several trips to the car.  Next!
  • 27. Why is Slow Read different?  Makes an order for party of 50  Pays  Cannot take the entire order with him, makes several trips to the car  Next! Customer stuck deciding what he wants Makes an order & Pays Takes the order Next!  Makes an order for party of 50  Pays  Cannot take the entire order with him, makes several trips to the car  Next!
  • 28. Why is Slow Read different? (contd..)  Defense mechanisms expect the crushing fist of malice to appear in the request  Instead, the entire transaction should be monitored  Defense mechanisms expect the crushing fist of malice to appear in the request  Instead, the entire transaction should be monitored
  • 29.  There is a good chance that you are. Default configurations of nginx, lighttpd, IIS, Apache, Varnish cache proxy, Shoutcast streaming server - are vulnerable to at least one of the mentioned attacks Am I vulnerable?  There is a good chance that you are. Default configurations of nginx, lighttpd, IIS, Apache, Varnish cache proxy, Shoutcast streaming server - are vulnerable to at least one of the mentioned attacks
  • 30.  Use available tools to simulate attacks. SlowHTTPTest covers all mentioned attacks and some more at http://slowhttptest.googlecode.com  Check out http://slowhammer.me to get access to your own whitehat botnet in the cloud  Use Qualys WAF or other firewalls that are supposed to protect, but test before you pay! What should I do?  Use available tools to simulate attacks. SlowHTTPTest covers all mentioned attacks and some more at http://slowhttptest.googlecode.com  Check out http://slowhammer.me to get access to your own whitehat botnet in the cloud  Use Qualys WAF or other firewalls that are supposed to protect, but test before you pay!
  • 31. Detection and Mitigation  Drop connections with abnormally small TCP advertised window(s) (i.e. <<16bits)  Set an absolute connection timeout, if possible  Limit length, number of headers to accept  Limit max size of message body to accept  Drop connections with HTTP methods (verbs) not supported by the URL  Limit accepted header and message body to a minimal reasonable length  Define the minimum data rate, and drop connections that are slower than that rate  Drop connections with abnormally small TCP advertised window(s) (i.e. <<16bits)  Set an absolute connection timeout, if possible  Limit length, number of headers to accept  Limit max size of message body to accept  Drop connections with HTTP methods (verbs) not supported by the URL  Limit accepted header and message body to a minimal reasonable length  Define the minimum data rate, and drop connections that are slower than that rate
  • 32. Detection and Mitigation  Qualys Web Application Scanner passively detects the slow attack vulnerabilities  ModSecurity v2.6 introduced a directive called SecWriteStateLimit that places a time limit on the concurrent number of threads (per IP address)  Snort is working on detecting connections with small TCP advertised window(s)  Christian Folini introduced Flying Frog script at https://www.netnea.com  Qualys Web Application Scanner passively detects the slow attack vulnerabilities  ModSecurity v2.6 introduced a directive called SecWriteStateLimit that places a time limit on the concurrent number of threads (per IP address)  Snort is working on detecting connections with small TCP advertised window(s)  Christian Folini introduced Flying Frog script at https://www.netnea.com
  • 34. OSI Model- a new approach OSI Model DoS Attack 7 Application Slowloris – Incomplete HTTP Requests 6 Presentation 5 Session5 Session 4 Transport SYN Flood – Incomplete TCP Handshakes 3 Network HTTP GET/POST Flood 2 Data Link 1 Physical Cut a cable
  • 35. A few more Attacks!A few more Attacks!
  • 36. “the sky is falling.... but we cannot tell you why” The new TCP DoS attacks Source: news.softpedia.com
  • 37. The “new” TCP DoS attacks  During 2008, the discovery of some (supposedly) new vulnerabilities received their share of press.  They were “announced” by Outpost24, but no details were provided – thus resulting in speculation by the community.  No counter-measures were proposed to vendors, either.  While not publicly credited for our work, we provided advice to vendors on these issues.  During 2008, the discovery of some (supposedly) new vulnerabilities received their share of press.  They were “announced” by Outpost24, but no details were provided – thus resulting in speculation by the community.  No counter-measures were proposed to vendors, either.  While not publicly credited for our work, we provided advice to vendors on these issues.
  • 38. The “new” TCP DoS attacks  For the most part, the vulnerabilities are:  Connection-flooding attacks (Naphta and FIN-WAIT-2 flooding attacks)  Socket send buffer attacks (Netkill and closed windows)  TCP reassembly buffer attacks  For the most part, the vulnerabilities are:  Connection-flooding attacks (Naphta and FIN-WAIT-2 flooding attacks)  Socket send buffer attacks (Netkill and closed windows)  TCP reassembly buffer attacks
  • 39. Some insights on the recent TCP DoS vulnerabilities Some insights on the recent TCP DoS vulnerabilities
  • 40. Connection-flooding attacks (Naphta and FIN-WAIT-2) Connection-flooding attacks (Naphta and FIN-WAIT-2)
  • 41. Naphta (connection-flooding attack)  TCP connections require end-points to keep state (in system memory) for the connections.  Memory is a limited resource, and thus can be targeted for exhaustion: simply establish lots of connections with the target system.  This attack vector was known as “Naphta” -- see CERT Advisory CA-2000-21.  To avoid exhausting his own resources simply crafts the required packets to establish TCP connections with the target system, thus bypassing its kernel implementation of TCP.  TCP connections require end-points to keep state (in system memory) for the connections.  Memory is a limited resource, and thus can be targeted for exhaustion: simply establish lots of connections with the target system.  This attack vector was known as “Naphta” -- see CERT Advisory CA-2000-21.  To avoid exhausting his own resources simply crafts the required packets to establish TCP connections with the target system, thus bypassing its kernel implementation of TCP.
  • 43. Countermeasures for Naphta  Key problem: an actual attack does not necessarily differ from a high-load scenario  Possible counter-measures:  Enforce per-user and pre-process limits  Enforce limits on the number of ongoing connections from a single system/prefix at the application-layer  Enforce limits on the number of ongoing connections from a single system/prefix at a firewall  Key problem: an actual attack does not necessarily differ from a high-load scenario  Possible counter-measures:  Enforce per-user and pre-process limits  Enforce limits on the number of ongoing connections from a single system/prefix at the application-layer  Enforce limits on the number of ongoing connections from a single system/prefix at a firewall
  • 44.  A typical connection-termination scenario: FIN-WAIT-2 flooding attack  A typical connection-termination scenario:
  • 45. FIN-WAIT-2 flooding attack  Problems that may arise due to the FIN-WAIT-2 state  There’s no limit on the amount of time a connection can stay in the FIN-WAIT-2 state – connections could stay forever in FIN-WAIT-2.  When TCP gets into the FIN-WAIT-2 state there’s no user-space controlling process (i.e., it’s hard to enforce application-layer limits)  Problems that may arise due to the FIN-WAIT-2 state  There’s no limit on the amount of time a connection can stay in the FIN-WAIT-2 state – connections could stay forever in FIN-WAIT-2.  When TCP gets into the FIN-WAIT-2 state there’s no user-space controlling process (i.e., it’s hard to enforce application-layer limits)
  • 47. Counter-measures for FIN-WAIT-2 flooding  Enforce a limit on the duration of the FIN-WAIT-2 state. E.g., Linux 2.4 enforces a limit of 60 seconds. Once that limit is reached, the connection is aborted.  Enforce on the number of ongoing connections with no controlling process.  The counter-measures for the Naptha attack still apply. However, it is difficult for applications to enforce limits (remember: no controlling process for the connections).  Enforce a limit on the duration of the FIN-WAIT-2 state. E.g., Linux 2.4 enforces a limit of 60 seconds. Once that limit is reached, the connection is aborted.  Enforce on the number of ongoing connections with no controlling process.  The counter-measures for the Naptha attack still apply. However, it is difficult for applications to enforce limits (remember: no controlling process for the connections).
  • 48. Counter-measures for FIN-WAIT-2 flooding  Applications should be modified so that they retain control of the connection for most states. This can be achieved with a conbination of the shutdown(), setsockopt(), and close().  Applications should be modified so that they retain control of the connection for most states. This can be achieved with a conbination of the shutdown(), setsockopt(), and close().
  • 49. Socket send buffer vulnerabilities  The socket send buffer keeps a copy of those data that have been accepted by TCP for delivery to the remote TCP end-point.  It is possible to exploit the Socket send buffer for a memory exhaustion attack:  Send an application request to the target system, but never acknowledge the response (Netkill).  Send an application request, but immediately close the receive window, so that the target TCP refrains from actually sending the response.  The socket send buffer keeps a copy of those data that have been accepted by TCP for delivery to the remote TCP end-point.  It is possible to exploit the Socket send buffer for a memory exhaustion attack:  Send an application request to the target system, but never acknowledge the response (Netkill).  Send an application request, but immediately close the receive window, so that the target TCP refrains from actually sending the response.
  • 50. Netkill  Data that have been sent but not yet acknowledged are kept in the socket send buffer for their possible retransmission.  TCP will retransmit those data until they either get acknowledged or the connection times out. In the mean time, system memory is tied to those data.  Easy to exploit for memory exhaustion: establish lots of TCP connections, send an applicattion-request on each of them, and never acknowledge the received data.  Data that have been sent but not yet acknowledged are kept in the socket send buffer for their possible retransmission.  TCP will retransmit those data until they either get acknowledged or the connection times out. In the mean time, system memory is tied to those data.  Easy to exploit for memory exhaustion: establish lots of TCP connections, send an applicattion-request on each of them, and never acknowledge the received data.
  • 52. Netkill (countermeasures)  Problem: it’s very hard to infer attack from the behavior of a single connection.  Possible counter-measures:  Measure connection progress at the application- layer  Do not use an unnecessarily large socket send buffer  Enforce per-user and pre-process limits  Enforce limits on the number of ongoing connections from a single system/prefix at the application- layer  Problem: it’s very hard to infer attack from the behavior of a single connection.  Possible counter-measures:  Measure connection progress at the application- layer  Do not use an unnecessarily large socket send buffer  Enforce per-user and pre-process limits  Enforce limits on the number of ongoing connections from a single system/prefix at the application- layer
  • 53. Netkill(countermeasures)  Enforce limits on the number of on-going connections from a single system/prefix at a firewall  When dropping connection, these are possible parameters that may provide hints for selecting the target connection:  Large amount of data queued in the TCP retransmission buffer  Small amount of data successfully transferred to the remote endpoint  Enforce limits on the number of on-going connections from a single system/prefix at a firewall  When dropping connection, these are possible parameters that may provide hints for selecting the target connection:  Large amount of data queued in the TCP retransmission buffer  Small amount of data successfully transferred to the remote endpoint
  • 54. Closed windows  The TCP sliding-window mechanism prevents a fast sender from overwhelming a slow consumer application.  When the advertised window is zero, the window is said to be closed.  The TCP sender polls the receiver from time to time to find out if the window has opened (persist timer). However, there’s no limit on the amount of time that the window can be closed.  The TCP sliding-window mechanism prevents a fast sender from overwhelming a slow consumer application.  When the advertised window is zero, the window is said to be closed.  The TCP sender polls the receiver from time to time to find out if the window has opened (persist timer). However, there’s no limit on the amount of time that the window can be closed.
  • 55. Closed windows  Easy to exploit for memory exhaustion: just send an applicattion-request to the remote end-point, and close the receive window.  Easy to exploit for memory exhaustion: just send an applicattion-request to the remote end-point, and close the receive window.
  • 57. Closed windows (countermeasures)  Problem: it’s very hard to infer attack from the behavior of a single connection.  It has been proposed that TCP should impose a limit on the amount of time that the window can be closed. However, this counter-measure is trivial to circumvent: just open the window a bit from time to time.  Problem: it’s very hard to infer attack from the behavior of a single connection.  It has been proposed that TCP should impose a limit on the amount of time that the window can be closed. However, this counter-measure is trivial to circumvent: just open the window a bit from time to time.
  • 58. Closed windows (countermeasures)  Measure connection progress at the application-layer  Do not use an unnecessarily large socket send buffer  Enforce per-user and pre-process limits  Enforce limits on the number of ongoing connections from a single system/prefix at the application-layer  Enforce limits on the number of ongoing connections from a single system/prefix at a firewall  Measure connection progress at the application-layer  Do not use an unnecessarily large socket send buffer  Enforce per-user and pre-process limits  Enforce limits on the number of ongoing connections from a single system/prefix at the application-layer  Enforce limits on the number of ongoing connections from a single system/prefix at a firewall
  • 59. Summary  Even though the simplest distributed DoS attacks are enough to knock down most web sites today, the nature of the attack will be sure to improve, and it’s better to be ready or, at least be aware of upcoming problems.  Even though the simplest distributed DoS attacks are enough to knock down most web sites today, the nature of the attack will be sure to improve, and it’s better to be ready or, at least be aware of upcoming problems.
  • 60. References  ModSecurity Advanced Topic of the Week: Mitigation of 'Slow Read" Denial of Service Attack  http://blog.spiderlabs.com/2012/01/modsecurity-advanced-topic-of-the-week- mitigation-of-slow-read-denial-of-service-attack.html  DDoS attacks in H2 2011 http://www.securelist.com/en/analysis/204792221/DDoS_attacks_in_H2_2011  The State of the Internet  http://www.akamai.com/stateoftheinternet/  Evaluation of slowhttptest against servers protected by CloudFlare  http://samsclass.info/123/proj10/slow-read.html  Blog posts on hardening web servers  https://community.qualys.com/blogs/securitylabs/  ModSecurity Advanced Topic of the Week: Mitigation of 'Slow Read" Denial of Service Attack  http://blog.spiderlabs.com/2012/01/modsecurity-advanced-topic-of-the-week- mitigation-of-slow-read-denial-of-service-attack.html  DDoS attacks in H2 2011 http://www.securelist.com/en/analysis/204792221/DDoS_attacks_in_H2_2011  The State of the Internet  http://www.akamai.com/stateoftheinternet/  Evaluation of slowhttptest against servers protected by CloudFlare  http://samsclass.info/123/proj10/slow-read.html  Blog posts on hardening web servers  https://community.qualys.com/blogs/securitylabs/
  • 61. Contact  V Raman teja  Network Security , Web Technologies, Graphic Designing & Coding  Email: venigallaramanteja@gmail.com  Ph: 9032195562  V Raman teja  Network Security , Web Technologies, Graphic Designing & Coding  Email: venigallaramanteja@gmail.com  Ph: 9032195562