Showing posts with label DOS. Show all posts
Showing posts with label DOS. Show all posts

Sunday, 17 March 2013

The Hacker’s Choice Releases SSL DOS Tool

thc-welcome

German hacker group “The Hacker’s Choice” officially released a new DDoS tool. The tool exploits a weakness in SSL to kick a server off the Internet.


Establishing a secure SSL connection requires 15x more processingpower on the server than on the client.THC-SSL-DOS exploits this asymmetric property by overloading theserver and knocking it off the Internet.This problem affects all SSL implementations today. The vendors are awareof this problem since 2003 and the topic has been widely discussed.This attack further exploits the SSL secure Renegotiation featureto trigger thousands of renegotiations via single TCP connection.Download:

Windows binary:
 thc-ssl-dos-1.4-win-bin.zip
Unix Source : thc-ssl-dos-1.4.tar.gz

Usage:
Use "./configure; make all install" to build and Run : ./thc-ssl-dos 127.3.133.7 443Tips & Tricks for 

whitehats
1. The average server can do 300 handshakes per second. This would require 10-25% of your laptops CPU.
2. Use multiple hosts (SSL-DOS) if an SSL Accelerator is used.
3. Be smart in target acquisition: The HTTPS Port (443) is not always the best choice. Other SSL enabled ports are more unlikely to use an SSL Accelerator (like the POP3S, SMTPS, ... or the secure database port).

Counter measurements:
No real solutions exists. The following steps can mitigate (but not solve) the problem:


1. Disable SSL-Renegotiation
2. Invest into SSL Accelerator

How to install LOIC(Low Orbit Ion Cannon) in Backtrack 5 R3

Low Orbit Ion Cannon

LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP packets or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.



1 - aptitude install git-core monodevelop


2 - Download loic.sh script wget https://raw.github.com/nicolargo/loicinstaller/master/loic.sh


3 - Make Folder - mkdir <folder name>


4 - install - ./loic.sh install


5 - update - ./loic.sh update


6 - Run loic - ./loic.sh run




Webapplication Attack : dos And ddos attacks[Video Demonstration]

ddos
What is a denial-of-service (DoS) attack?
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.

The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.

An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.

What is a distributed denial-of-service (DDoS) attack?
In a distributed denial-of-service (DDoS) attack, an attacker may use your computer to attack another computer. By taking advantage of security vulnerabilities or weaknesses, an attacker could take control of your computer. He or she could then force your computer to send huge amounts of data to a website or send spam to particular email addresses. The attack is "distributed" because the attacker is using multiple computers, including yours, to launch the denial-of-service attack.

dos and ddos attacks


Attacker exhaust available server resources by sending hundreds of resource-intensive requests,such as pulling out large image files or requesting dynamic pages that require expensive search operations on the backend database servers

Why Are Application Vulnerable?

  • Reasonable Use Expectations

  • Application Environment Bottlenecks

  • Implementation Flaws

  • poor Data Validation


Web Server Resource ConsumptionTargets


  • CPU,Memory and Sockets

  • Disk Bandwidth

  • Database Bandwidth

  • Worker Processes


Web Services UnavailabilityApplication-Level DOS attacks enulate the same request syntex and network-Level traffic characteristics as that of the legitimate clients,which makes it undetectable by existing DOS protection measures .


Login Attacks
The attacker may overload the login process by continually sending login requests that require the presentation tier to access the authentication mechanism,rendering it unavailable or unreasonably slow to respond.User Registration DOSThe attacker could create a program that submits the registration forms repeatedly ;adding a large number of squrious users to the application.

Account Lock-OUT Attacks

The attacker may enumerate username through another vulerability n the application and then attempt to authenticate to the site using valid username and incorrect passwords which will lock out the account after the specified number of failed attempts.At this point legitimate users will not be able to use the site .

User Enumeration

If application states which part of the username/password pair is incorrect,an attacker can automate the process of trying common usernames from a dictionary file to enumerate the users of the Application.



How do you know if an attack is happening?

Not all disruptions to service are the result of a denial-of-service attack. There may be technical problems with a particular network, or system administrators may be performing maintenance. However, the following symptoms could indicate a DoS or DDoS attack:


  •     unusually slow network performance (opening files or accessing websites)

  •     unavailability of a particular website

  •     inability to access any website

  •    dramatic increase in the amount of spam you receive in your account


How do you avoid being part of the problem?

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:


  •     Install and maintain anti-virus software (see Understanding Anti-Virus Software for more information).

  •     Install a firewall, and configure it to restrict traffic coming into and leaving your computer (see Understanding Firewalls for more information).

  •     Follow good security practices for distributing your email address (see Reducing Spam for more information). Applying email filters may help you manage unwanted traffic.