Friday, August 28, 2020

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related articles
  1. Hacker Tools For Windows
  2. Hacking Tools
  3. Pentest Tools Bluekeep
  4. Hacking Tools Kit
  5. Hack Rom Tools
  6. Hacker Tools Windows
  7. Hack And Tools
  8. Hacking Tools
  9. Pentest Tools Nmap
  10. Tools For Hacker
  11. Tools 4 Hack
  12. Hacker Tools Free
  13. Hacking Tools Windows 10
  14. Pentest Tools Github
  15. Hacker Tools Github
  16. Hack Tools For Games
  17. Hackrf Tools
  18. Black Hat Hacker Tools
  19. Hacker Tools 2020
  20. Hacking Tools 2019
  21. Pentest Tools Website Vulnerability
  22. Hacker Tools For Ios
  23. How To Hack
  24. Hacks And Tools
  25. Pentest Tools Free
  26. Hack App
  27. Install Pentest Tools Ubuntu
  28. Hack Tools
  29. Hack Tools For Ubuntu
  30. Best Hacking Tools 2019
  31. Hack Tools For Games
  32. Hack Tool Apk
  33. Pentest Tools Nmap
  34. Hack Tools
  35. Hacking Tools Windows 10
  36. Hackers Toolbox
  37. Ethical Hacker Tools
  38. What Are Hacking Tools
  39. Hacker Tools 2020
  40. Pentest Tools Kali Linux
  41. Pentest Automation Tools
  42. Hack Tool Apk No Root
  43. Hacker Tools Linux
  44. Pentest Tools Subdomain
  45. Hacker Tools Free Download
  46. How To Make Hacking Tools
  47. Hack Tools Github
  48. Ethical Hacker Tools
  49. Hacker Tool Kit
  50. Blackhat Hacker Tools
  51. New Hacker Tools
  52. Pentest Tools Port Scanner
  53. Hacks And Tools
  54. Best Hacking Tools 2020
  55. Hack Tools Mac
  56. Hacker Tools Apk
  57. Hacking Tools
  58. Hak5 Tools
  59. Hack Tools For Ubuntu
  60. Hack Tools
  61. Hack Tools Download
  62. Hacker Tools Free
  63. Pentest Tools Port Scanner
  64. Nsa Hacker Tools
  65. Underground Hacker Sites
  66. Hacker Tools For Mac
  67. Hack Tools 2019
  68. Hack Tools
  69. Hacking Tools For Kali Linux
  70. Install Pentest Tools Ubuntu
  71. Hack And Tools
  72. Pentest Tools Online
  73. Hacker Tools Apk
  74. Hacking Tools Github
  75. Pentest Tools Find Subdomains
  76. Hacker Tools For Ios
  77. Hack Tools Pc
  78. Hacker Techniques Tools And Incident Handling
  79. Pentest Tools
  80. Hack Tools For Ubuntu
  81. Nsa Hack Tools Download
  82. Hacking Apps
  83. Termux Hacking Tools 2019
  84. Hacking Tools Kit
  85. Pentest Tools List
  86. Pentest Tools Apk
  87. Best Pentesting Tools 2018
  88. Hacker Tools Linux
  89. Hacking App
  90. Hacking Tools For Windows 7
  91. Pentest Tools Url Fuzzer
  92. Hacker Tools Mac
  93. Hacking App
  94. Termux Hacking Tools 2019
  95. Hacker Tool Kit
  96. Hacking App
  97. Pentest Tools Subdomain
  98. What Are Hacking Tools
  99. Hack And Tools
  100. Hacking Tools For Games
  101. Hak5 Tools
  102. Pentest Tools Alternative
  103. Hacking Tools Github
  104. Pentest Tools Apk
  105. Pentest Tools
  106. Hacking Tools Mac
  107. Pentest Tools Nmap
  108. Pentest Tools Nmap
  109. Hacker Tool Kit
  110. Game Hacking
  111. Hacker Tools For Ios
  112. Black Hat Hacker Tools
  113. Hacker Tools For Ios
  114. Pentest Tools List
  115. Pentest Tools Online
  116. Hacking Tools For Games
  117. Pentest Tools Alternative
  118. Install Pentest Tools Ubuntu
  119. How To Make Hacking Tools
  120. New Hack Tools
  121. Hak5 Tools
  122. Tools Used For Hacking
  123. Hacker Tools For Mac
  124. Hacking Tools 2019
  125. Pentest Tools Open Source
  126. Hack Apps
  127. Pentest Tools Kali Linux
  128. Wifi Hacker Tools For Windows
  129. Black Hat Hacker Tools
  130. Growth Hacker Tools
  131. Pentest Tools Nmap
  132. Hacking Tools For Pc
  133. Growth Hacker Tools
  134. Ethical Hacker Tools
  135. New Hacker Tools
  136. Hack Tools Mac
  137. Hacker Security Tools
  138. Pentest Tools Linux
  139. Nsa Hack Tools
  140. Best Hacking Tools 2020
  141. Hack Tools 2019
  142. Hacking Tools Usb
  143. Hacker Tools Linux
  144. Hacking Tools For Kali Linux
  145. How To Hack
  146. Underground Hacker Sites
  147. Hacking Tools Software

No comments:

Post a Comment