terça-feira, 23 de janeiro de 2024

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related news


  1. Pentest Tools Find Subdomains
  2. Hack Tools
  3. Hacking Tools For Games
  4. Pentest Tools Bluekeep
  5. Hacking Tools Software
  6. Computer Hacker
  7. Nsa Hack Tools
  8. Pentest Tools Windows
  9. Hackers Toolbox
  10. Hacking Tools For Beginners
  11. Hacking Tools Hardware
  12. Pentest Automation Tools
  13. Pentest Tools Linux
  14. Pentest Tools Apk
  15. Top Pentest Tools
  16. Hack Tools
  17. Best Hacking Tools 2019
  18. Hack Tools Online
  19. Bluetooth Hacking Tools Kali
  20. Hack And Tools
  21. Pentest Tools For Ubuntu
  22. Hack Tool Apk No Root
  23. Pentest Tools Alternative
  24. Hack Tools Online
  25. Hack Rom Tools
  26. Android Hack Tools Github
  27. Pentest Tools Tcp Port Scanner
  28. How To Install Pentest Tools In Ubuntu
  29. Pentest Reporting Tools
  30. Hack Tools Pc
  31. Hacker Search Tools
  32. Hacking Tools And Software
  33. Best Hacking Tools 2020
  34. Hacks And Tools
  35. Hacking Tools For Kali Linux
  36. Hacker Tools Apk Download
  37. Underground Hacker Sites
  38. Hacker Tools For Mac
  39. Pentest Tools Website
  40. Pentest Tools Linux
  41. Game Hacking
  42. Hacking Tools 2020
  43. Pentest Tools Find Subdomains
  44. Hack Tools For Ubuntu
  45. What Are Hacking Tools
  46. Kik Hack Tools
  47. Hacking Tools 2020
  48. Pentest Tools For Windows
  49. Hacking Tools And Software
  50. World No 1 Hacker Software
  51. Hacker Tools List
  52. Hacking Tools For Mac
  53. Hack And Tools
  54. Hack Tools Pc
  55. Termux Hacking Tools 2019
  56. Pentest Tools Subdomain

Nenhum comentário:

Postar um comentário