Mga Pahina

Thursday, August 20, 2020

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with múltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related posts


  1. Kik Hack Tools
  2. Hacking Tools Online
  3. Hacking Tools 2020
  4. Hack Tools Online
  5. Pentest Tools List
  6. Pentest Tools Kali Linux
  7. Pentest Tools
  8. Computer Hacker
  9. Hacking Tools Windows 10
  10. Hacking Tools 2020
  11. Pentest Tools Nmap
  12. New Hacker Tools
  13. Pentest Tools Linux
  14. Hacking Tools Windows
  15. Pentest Tools Android
  16. Hacker Tools For Mac
  17. Pentest Tools Tcp Port Scanner
  18. Hacker Tools Free
  19. Hacking Tools For Windows Free Download
  20. Hacking Apps
  21. Tools For Hacker
  22. Hacking Apps
  23. Pentest Tools For Mac
  24. Hack And Tools
  25. Computer Hacker
  26. Pentest Tools Android
  27. Pentest Tools For Windows
  28. Pentest Tools Download
  29. Best Hacking Tools 2019
  30. Termux Hacking Tools 2019
  31. Hack Tools 2019
  32. Hack Rom Tools
  33. Tools Used For Hacking
  34. Hacking Tools Online
  35. Hack Tools Download
  36. Android Hack Tools Github
  37. Hack Tool Apk No Root
  38. Hacker Tools 2020
  39. Hack Tool Apk
  40. Usb Pentest Tools
  41. Nsa Hacker Tools
  42. Pentest Tools Url Fuzzer
  43. Best Hacking Tools 2020
  44. Hackers Toolbox
  45. Hacking Apps
  46. Best Hacking Tools 2019
  47. Hack Tools 2019
  48. Pentest Automation Tools
  49. Pentest Tools Apk
  50. Pentest Tools Framework
  51. Hacking Tools 2019
  52. Tools Used For Hacking
  53. Hacking Tools For Kali Linux
  54. Pentest Tools For Android
  55. Pentest Tools Alternative
  56. Hacker Security Tools
  57. Pentest Recon Tools
  58. Physical Pentest Tools
  59. Hack Tools For Games
  60. Install Pentest Tools Ubuntu
  61. Pentest Tools Online
  62. Hacking Tools For Pc
  63. Hacker Security Tools
  64. Hack Tools For Mac
  65. Hacking Tools For Kali Linux
  66. Kik Hack Tools
  67. Tools 4 Hack
  68. Hacking Tools Online
  69. Pentest Recon Tools
  70. Pentest Tools
  71. Pentest Tools Port Scanner
  72. Hacking Tools Github
  73. Hacking Tools For Beginners
  74. Hacking Tools Download
  75. Hack Tools Online
  76. Nsa Hack Tools
  77. Physical Pentest Tools
  78. Pentest Tools Open Source
  79. Hacker Tools For Pc
  80. Hacker Tools List
  81. Hackers Toolbox
  82. Hacking Tools And Software
  83. Hacker Techniques Tools And Incident Handling
  84. Nsa Hacker Tools
  85. Best Pentesting Tools 2018
  86. Hacker Tools Linux
  87. Best Hacking Tools 2019
  88. Growth Hacker Tools
  89. Bluetooth Hacking Tools Kali
  90. Hacker Tools Windows
  91. Hack Rom Tools
  92. Hack App
  93. Hack Tools For Windows
  94. Github Hacking Tools
  95. Computer Hacker
  96. Hacker Techniques Tools And Incident Handling
  97. Hack Rom Tools
  98. Pentest Tools Website
  99. Hacker Tools Free
  100. Pentest Tools Website Vulnerability
  101. Pentest Tools Android
  102. Install Pentest Tools Ubuntu
  103. Hacking App
  104. Hacking App
  105. Hacking Tools Pc
  106. Best Hacking Tools 2020
  107. Pentest Tools Nmap
  108. Hacking Tools For Kali Linux
  109. What Are Hacking Tools
  110. Hack Tools Download
  111. Hacking Tools Mac
  112. Hacking Tools 2020
  113. Termux Hacking Tools 2019
  114. Hacker Tools For Pc
  115. Hacking Tools For Pc
  116. Hacker Tools
  117. Pentest Tools Subdomain
  118. What Is Hacking Tools
  119. Hacking Tools For Beginners
  120. Hack Tools For Pc
  121. Hacking Tools 2020
  122. What Is Hacking Tools
  123. Hack Tools Pc
  124. Hacker Tools Hardware
  125. Pentest Tools Apk
  126. Hacking Tools Hardware
  127. Pentest Tools Bluekeep
  128. Hacking Tools Software
  129. Pentest Reporting Tools
  130. Termux Hacking Tools 2019
  131. Pentest Tools For Windows
  132. Hacker Tools For Windows
  133. Beginner Hacker Tools

No comments:

Post a Comment