In the past I had to do several DoS security audits, with mĂșltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.
One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.
In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.
There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol
Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.
As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking.
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.
I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.
The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.
Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.
And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.
More articles
- Pentest Box Tools Download
- Hacking Tools For Beginners
- Hackers Toolbox
- Underground Hacker Sites
- Hackrf Tools
- Termux Hacking Tools 2019
- Install Pentest Tools Ubuntu
- Hack Tools 2019
- Hacker Tools 2020
- Hacker
- What Are Hacking Tools
- Hack Tools Github
- Hackers Toolbox
- Pentest Tools For Windows
- Hack Tools Online
- Hacking Tools Usb
- Hackers Toolbox
- Hacking Tools Hardware
- Hacker Tools Software
- How To Install Pentest Tools In Ubuntu
- Ethical Hacker Tools
- Hack Tool Apk
- Pentest Tools Subdomain
- Hacking Tools Kit
- Pentest Tools Apk
- Pentest Tools Find Subdomains
- Hak5 Tools
- Nsa Hack Tools Download
- Pentest Tools Port Scanner
- Hacker Techniques Tools And Incident Handling
- Android Hack Tools Github
- Tools For Hacker
- Hacking Tools Pc
- Pentest Tools Kali Linux
- Hack App
- Hacking Tools For Games
- Pentest Tools Framework
- Best Pentesting Tools 2018
- Pentest Tools Tcp Port Scanner
- Hacking Tools Name
- Underground Hacker Sites
- Hacking Apps
- Hack Tools Mac
- Hacking Tools 2020
- Physical Pentest Tools
- Hacker Tools 2019
- Pentest Tools List
- Hack Tool Apk
- Pentest Tools Framework
- Android Hack Tools Github
- Best Hacking Tools 2019
- Hacker Tools Online
- Hacker Tools Free
- Hacker Tools Linux
- Pentest Tools Free
- Hacking Tools 2019
- Pentest Tools List
- Hacker Tools
- Pentest Tools For Windows
- Pentest Tools Alternative
- Hacker Tools For Mac
- Hacking Tools Kit
- Pentest Tools For Ubuntu
- Hackers Toolbox
- Hacking Apps
- Pentest Tools For Windows
- Pentest Tools Linux
- Pentest Tools
- Hacker Tools For Mac
- Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Hack Tools For Pc
- Beginner Hacker Tools
- Termux Hacking Tools 2019
- Pentest Tools Nmap
- Hacking Tools For Windows Free Download
- Pentest Tools Alternative
- Hack Tools 2019
- Hacker Tools Free
- Hacker Tools Online
- Usb Pentest Tools
- Hacker Tools 2020
- Pentest Tools Subdomain
- Pentest Tools Windows
- Hacker Techniques Tools And Incident Handling
- Bluetooth Hacking Tools Kali
- Underground Hacker Sites
- Pentest Tools
- Hack App
- Hack Tools Download
- Pentest Reporting Tools
- Hackrf Tools
- Hacking Tools Software
- Pentest Tools Bluekeep
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Name
- Pentest Tools Find Subdomains
- Hack App
- Usb Pentest Tools
- How To Make Hacking Tools
- Pentest Tools Android
- Pentest Tools Apk
- Hacker Tools Hardware
- Pentest Reporting Tools
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Hacking Tools Github
- Hacking Tools Download
- Top Pentest Tools
- Nsa Hacker Tools
- Hacker Tools
- Blackhat Hacker Tools
- Pentest Tools Open Source
- Pentest Automation Tools
- Pentest Tools Find Subdomains
- Physical Pentest Tools
- Hacker Tools Software
- Pentest Tools Kali Linux
- Pentest Tools Website
- Hacker Techniques Tools And Incident Handling
- Tools For Hacker
- Hacker Tools Windows
- How To Make Hacking Tools
- Hack And Tools
- Nsa Hacker Tools
- Beginner Hacker Tools
- Pentest Tools Bluekeep
- Pentest Tools Subdomain
- Hack Website Online Tool
- Computer Hacker
- Hacker Tools Github
- Hack Tools Mac
- Hacking Tools Github
- Hacker Tools Mac
- Pentest Tools Tcp Port Scanner
- Hacking Tools 2019
- Hacker Tools Windows
- Hacker Tools For Windows
- Hacking Tools Windows
- Tools For Hacker
- Nsa Hack Tools Download
- Nsa Hack Tools Download
- Hacking Tools Usb
- Beginner Hacker Tools
- Hacker Tool Kit
- Hack Tools 2019
- Pentest Tools Kali Linux
- Hacking Tools Mac
Geen opmerkings nie:
Plaas 'n opmerking