Ethereum Miner - Mine and Earn free Ethereum Doloca.net: Online Booking - Hotels and Resorts, Vacation Rentals and Car Rentals, Flight Bookings, Activities and Festivals, Tour

Wednesday, August 26, 2020

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

More info
  1. Pentest Tools Linux
  2. Hack Tools 2019
  3. Hack Tools Github
  4. Pentest Tools Download
  5. Best Hacking Tools 2020
  6. Blackhat Hacker Tools
  7. Hacking Tools For Mac
  8. Best Hacking Tools 2020
  9. Hacking Tools Name
  10. Hacker Tools For Mac
  11. Nsa Hack Tools
  12. Hack Tools
  13. How To Hack
  14. Nsa Hack Tools
  15. Hacking Tools For Pc
  16. Hacker Tools Software
  17. New Hacker Tools
  18. Physical Pentest Tools
  19. Pentest Tools Url Fuzzer
  20. Hacking Tools Github
  21. Hack Tools For Ubuntu
  22. Hacker Techniques Tools And Incident Handling
  23. Termux Hacking Tools 2019
  24. Hacking Tools For Windows
  25. Hacker Tools
  26. Hacker Tools
  27. Blackhat Hacker Tools
  28. Hack Tools For Windows
  29. Hacker Tools Linux
  30. Hacking Tools Windows 10
  31. Android Hack Tools Github
  32. Hack Tools Pc
  33. Hacking Tools Kit
  34. Hacker Tools List
  35. Hacking Tools 2019
  36. Growth Hacker Tools
  37. Pentest Tools Online
  38. Github Hacking Tools
  39. Pentest Tools List
  40. Hacker Tools Mac
  41. Computer Hacker
  42. Bluetooth Hacking Tools Kali
  43. Hack Tools For Windows
  44. Hack Tools Online
  45. Underground Hacker Sites
  46. Hacking Tools Usb
  47. Hacking Tools Windows
  48. Usb Pentest Tools
  49. Hacker Tools Hardware
  50. What Is Hacking Tools
  51. Pentest Tools Github
  52. Hacking Tools 2019
  53. Hack Website Online Tool
  54. Hack Tool Apk No Root
  55. Hacker
  56. Pentest Tools Review
  57. Underground Hacker Sites
  58. Hacking Tools Online
  59. Hacking Tools Online
  60. Hacker Tools Software
  61. Hacker Tools For Mac
  62. Hacker Techniques Tools And Incident Handling
  63. Best Hacking Tools 2020
  64. Hacking Tools Github
  65. Hacking Tools
  66. Pentest Tools Online
  67. Pentest Tools Port Scanner
  68. Tools Used For Hacking
  69. Hack Tools
  70. Hacking Tools For Games
  71. Best Hacking Tools 2019
  72. Hacker Tools
  73. Hacker Tools Free
  74. Pentest Tools Subdomain
  75. Best Hacking Tools 2019
  76. Hack Tools
  77. Pentest Tools Framework
  78. Hacking Tools 2019
  79. What Is Hacking Tools
  80. How To Hack
  81. Pentest Tools Tcp Port Scanner
  82. Pentest Tools Port Scanner
  83. Easy Hack Tools
  84. Pentest Tools Url Fuzzer
  85. Hacker Tools For Mac
  86. How To Make Hacking Tools
  87. Pentest Tools Open Source
  88. Hacking Tools
  89. Hacking Tools For Kali Linux
  90. Hacker Tools Github
  91. Best Hacking Tools 2020
  92. What Is Hacking Tools
  93. Pentest Tools Download
  94. Best Hacking Tools 2020
  95. Hack Tools For Mac
  96. Hackrf Tools
  97. Ethical Hacker Tools
  98. Hacker Hardware Tools
  99. Hacking Tools For Windows
  100. Pentest Tools For Android
  101. Hacker Tool Kit
  102. Pentest Box Tools Download
  103. Best Hacking Tools 2020
  104. Hack Tools
  105. Hacker Tools Apk
  106. Pentest Tools
  107. Install Pentest Tools Ubuntu
  108. Hacking Tools For Games
  109. Best Pentesting Tools 2018
  110. Hacker Tools List
  111. Pentest Tools Open Source
  112. Pentest Tools Alternative
  113. Hackers Toolbox
  114. How To Make Hacking Tools
  115. Hacking Tools Online
  116. How To Make Hacking Tools
  117. Hacker Hardware Tools
  118. Hacker Tools Apk Download
  119. Pentest Tools Download
  120. Underground Hacker Sites
  121. Usb Pentest Tools
  122. Hacker Security Tools
  123. Hacker Tools For Mac
  124. Hack Tools Pc
  125. Pentest Tools Review
  126. Nsa Hacker Tools
  127. Hacker Tools Free
  128. Game Hacking
  129. Hacker Tools For Windows
  130. Hack Tools For Games
  131. Hacker Tools Hardware
  132. Hacking Tools Hardware
  133. Hacking Tools Mac
  134. Hack Tools For Windows
  135. Black Hat Hacker Tools
  136. Top Pentest Tools
  137. Hacker Tools 2019
  138. What Is Hacking Tools
  139. Hacker
  140. Pentest Recon Tools
  141. Pentest Tools Windows
  142. Ethical Hacker Tools
  143. Hacking Tools Pc
  144. Pentest Tools Free
  145. Hack App
  146. Hacking Tools Github
  147. Hack Tools For Windows
  148. Hack Tools For Ubuntu
  149. Hacking Tools And Software
  150. Black Hat Hacker Tools
  151. Hacking Tools Pc
  152. Hacker Techniques Tools And Incident Handling
  153. Hack Tools For Games
  154. Pentest Tools Online
  155. Hacking Tools Mac
  156. New Hacker Tools
  157. Hack And Tools
  158. Hack Website Online Tool
  159. Pentest Tools Website Vulnerability
  160. Hackrf Tools
  161. Hacking Tools Name
  162. Hack Tools For Ubuntu
  163. Hacking Tools Pc
  164. How To Install Pentest Tools In Ubuntu
  165. Hacking Tools
  166. Growth Hacker Tools
  167. Hack Tool Apk No Root
  168. Kik Hack Tools
  169. Hack And Tools
  170. Pentest Automation Tools
  171. Hacks And Tools
  172. Nsa Hacker Tools
  173. Pentest Tools Bluekeep
  174. Hacker Tools Hardware

No comments:

Post a Comment

Ethereum Miner - Mine and Earn free Ethereum