GALERIA FOTOGRAFICA

Todas las fotos de familia, amigos y eventos realizados por los grupos al cual pertenesco estan en este segmento...

martes, 23 de enero de 2024

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related links

  1. Pentest Tools Android
  2. Hacker Security Tools
  3. Blackhat Hacker Tools
  4. Install Pentest Tools Ubuntu
  5. Hack Tools For Windows
  6. Hack Tools For Windows
  7. Hacker Security Tools
  8. Pentest Tools
  9. Android Hack Tools Github
  10. Pentest Tools For Android
  11. Hacking Tools
  12. Hacker Tools 2020
  13. Pentest Tools Free
  14. Beginner Hacker Tools
  15. Hacking Tools Name
  16. Ethical Hacker Tools
  17. Pentest Tools Port Scanner
  18. Pentest Tools For Mac
  19. Growth Hacker Tools
  20. Pentest Tools Website
  21. Pentest Tools Framework
  22. Pentest Tools List
  23. Hacker Tools 2020
  24. Growth Hacker Tools
  25. Pentest Tools Kali Linux
  26. Hacking Tools Usb
  27. Hacking Tools For Kali Linux
  28. Android Hack Tools Github
  29. Best Hacking Tools 2019
  30. Hack And Tools
  31. Hacker Tool Kit
  32. Pentest Tools Free
  33. Pentest Reporting Tools
  34. Top Pentest Tools
  35. Pentest Tools Linux
  36. Hack Tools Online
  37. Hack Tools For Windows
  38. Pentest Tools Linux
  39. Hacking Tools For Games
  40. Hacking Tools Kit
  41. Hacking Tools Pc
  42. Hacking Tools Download
  43. Hacking Tools For Windows Free Download
  44. Hacking Apps
  45. Pentest Tools Framework
  46. Wifi Hacker Tools For Windows
  47. Ethical Hacker Tools
  48. Hacker Tools Mac
  49. Hacking Tools For Beginners
  50. Nsa Hack Tools Download
  51. New Hack Tools
  52. Hack Tools
  53. Hacker Tools 2019
  54. Game Hacking
  55. Hacking Tools For Windows
  56. Hacking Tools For Pc
  57. Nsa Hack Tools Download
  58. Easy Hack Tools
  59. Pentest Tools Port Scanner
  60. Hacker Tools 2019
  61. Hacker Search Tools
  62. Hacking Tools For Mac
  63. Hacker Security Tools
  64. Pentest Tools Bluekeep
  65. Hacking Tools Download
  66. Github Hacking Tools
  67. Termux Hacking Tools 2019
  68. Pentest Tools For Windows
  69. Pentest Box Tools Download
  70. Pentest Tools Download
  71. Hacker Tools For Mac
  72. Hacking Tools Download
  73. Bluetooth Hacking Tools Kali
  74. Best Hacking Tools 2020
  75. Hack Tools Online
  76. Github Hacking Tools
  77. Nsa Hack Tools Download
  78. Hacker Tools 2019
  79. Hacker Tools Github
  80. How To Install Pentest Tools In Ubuntu
  81. Ethical Hacker Tools
  82. Hacking Tools For Games
  83. Hacker Tools For Ios
  84. Best Hacking Tools 2020
  85. Pentest Box Tools Download
  86. Hacker Tools Linux
  87. Pentest Tools Free
  88. Hacking Tools For Windows Free Download
  89. Pentest Tools Review
  90. Hacker Tools Online
  91. Pentest Tools Apk
  92. Hackrf Tools
  93. Best Hacking Tools 2019
  94. Pentest Tools
  95. Hacker Tools Software
  96. Hack And Tools
  97. Hacking Tools For Games
  98. Hacking Tools And Software
  99. Pentest Tools Kali Linux
  100. Hack Tools Mac
  101. Hacking Tools Online
  102. Pentest Tools For Mac
  103. Hacker Tools Free Download
  104. Hack Tool Apk
  105. Hack Tools For Mac
  106. Hacking Tools Download

0 comentarios:

Blog Archive

  © Blogger templates ProBlogger Template by Ourblogtemplates.com 2008

Back to TOP