Dinsdag 30 Mei 2023

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with mĂșltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

More articles
  1. Hack Tools Pc
  2. Hacker Techniques Tools And Incident Handling
  3. Nsa Hacker Tools
  4. Hack Tools 2019
  5. Hacking Tools Usb
  6. Hacking Tools For Windows 7
  7. Pentest Tools Website
  8. Pentest Tools Url Fuzzer
  9. Hacker Hardware Tools
  10. Hacker Tools Github
  11. Hacking Tools
  12. Hackers Toolbox
  13. Pentest Tools
  14. Hacking Tools Name
  15. Nsa Hacker Tools
  16. Hacking Tools For Mac
  17. Hacking Tools 2020
  18. Pentest Tools Website
  19. Hacking Tools Github
  20. Hacking Tools For Pc
  21. Wifi Hacker Tools For Windows
  22. Hacking Tools Pc
  23. Hacking Tools For Beginners
  24. Hacking Tools Download
  25. Pentest Tools For Android
  26. Android Hack Tools Github
  27. How To Hack
  28. Bluetooth Hacking Tools Kali
  29. Pentest Tools Github
  30. Hacking Tools Mac
  31. Hacking Tools For Pc
  32. Hacker Tools
  33. Github Hacking Tools
  34. Pentest Tools Windows
  35. Hack Tools
  36. Hacking Tools 2020
  37. Hacking Tools Windows
  38. Hacking Tools 2019
  39. Pentest Box Tools Download
  40. Pentest Tools Kali Linux
  41. Pentest Tools
  42. Pentest Tools Windows
  43. Ethical Hacker Tools
  44. Hacking Tools For Mac
  45. Pentest Tools Windows
  46. Pentest Tools Website Vulnerability
  47. Pentest Tools Framework
  48. Hacking Tools And Software
  49. Pentest Tools Online
  50. Pentest Tools Download
  51. Hacker Tools Software
  52. Hacking Tools Name
  53. Hacking Tools Hardware
  54. Hacker Tools Mac
  55. Github Hacking Tools
  56. Underground Hacker Sites
  57. Hacking Tools Kit
  58. Hacker Tools Apk Download
  59. Hack And Tools
  60. Hacking Tools Name
  61. Hack Tools For Pc
  62. Easy Hack Tools
  63. Hacker Search Tools
  64. Hacker Techniques Tools And Incident Handling
  65. Pentest Reporting Tools
  66. Hacker Tools
  67. Pentest Tools
  68. Hak5 Tools
  69. Underground Hacker Sites
  70. What Are Hacking Tools

Geen opmerkings nie:

Plaas 'n opmerking