Colline del Vento - Vigna e Cantina

Blog Vino - Colline del Vento

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related news
  1. Free Pentest Tools For Windows
  2. Pentest Tools Website Vulnerability
  3. Hack Tools For Pc
  4. New Hack Tools
  5. Underground Hacker Sites
  6. Pentest Recon Tools
  7. Hacking Tools For Beginners
  8. Hacker Tools Linux
  9. Hacking Tools Download
  10. Physical Pentest Tools
  11. Hacking Tools Pc
  12. Hacker Tools Apk
  13. Nsa Hack Tools Download
  14. Hack Tools Online
  15. Pentest Tools Subdomain
  16. Hacking Tools Free Download
  17. Hack Tool Apk
  18. Hacker Tools
  19. Hacking Tools Software
  20. Pentest Tools For Android
  21. Hacking Tools For Beginners
  22. Pentest Tools Alternative
  23. Hacker Tools Mac
  24. Pentest Automation Tools
  25. Tools 4 Hack
  26. Hacker Techniques Tools And Incident Handling
  27. New Hack Tools
  28. Hack Tools For Pc
  29. How To Install Pentest Tools In Ubuntu
  30. Hacker Tools Windows
  31. Pentest Tools
  32. Hacker Techniques Tools And Incident Handling
  33. Hacker Tools Free Download
  34. Hacking Tools Online
  35. Wifi Hacker Tools For Windows
  36. Pentest Tools Linux
  37. Hacking Tools Software
  38. Hack Tools Github
  39. Hacking Tools Free Download
  40. Hackers Toolbox
  41. Pentest Tools
  42. Hacker Hardware Tools
  43. Pentest Box Tools Download
  44. Hack Tools For Mac
  45. Nsa Hack Tools
  46. Nsa Hacker Tools
  47. Pentest Tools Subdomain
  48. Pentest Recon Tools
  49. Github Hacking Tools
  50. Hacker Tools Free Download
  51. Physical Pentest Tools
  52. Pentest Tools Online
  53. Github Hacking Tools
  54. Hacker Tools For Mac
  55. Hack Tools
  56. Black Hat Hacker Tools
  57. Hacker Tools Linux
  58. Hacker
  59. Usb Pentest Tools
  60. Pentest Tools Website
  61. Hacker Tools Free
  62. Pentest Tools Free
  63. Hacking Tools For Pc
  64. Hacking Tools For Beginners
  65. Pentest Tools For Ubuntu
  66. Hacking Tools For Windows 7
  67. Hacking Tools For Mac
  68. Pentest Reporting Tools
  69. Hack Tool Apk
  70. Hacker Tools For Ios
  71. Pentest Tools List
  72. Pentest Tools Review
  73. Top Pentest Tools
  74. Hacker Search Tools
  75. Hack Tools Pc
  76. Hacking Tools 2019
  77. Hak5 Tools
  78. Pentest Tools Bluekeep
  79. Hacking Tools For Kali Linux
  80. Hack Tools For Ubuntu
  81. New Hack Tools
  82. Hacking Apps
  83. Hacker Tools 2020
  84. Hacking Tools For Kali Linux
  85. Pentest Tools
  86. Tools Used For Hacking
  87. How To Install Pentest Tools In Ubuntu
  88. Hacking Tools
  89. Hacker Tools For Mac
  90. Pentest Tools Github
  91. Usb Pentest Tools
  92. Pentest Tools Tcp Port Scanner
  93. Hacking App
  94. Tools Used For Hacking
  95. Hack Tools Pc
  96. Hacking Tools For Windows 7
  97. Tools 4 Hack
  98. Hacker Tools Free Download
  99. Pentest Tools Nmap
  100. Hacker Tools Mac
  101. Hack Tools For Pc
  102. Hacker Tools For Ios
  103. Pentest Tools Review
  104. How To Install Pentest Tools In Ubuntu


0 Commenti:

Posta un commento

Iscriviti a Commenti sul post [Atom]

<< Home page


Copyright © 2006 Colline del Vento di Mario Castangia - Sito Ottimizzato per Internet Explorer 6.0 - Best View 1024x768px