DOS Attacks (Lesson 12) Flashcards
Email Flooding/bombing
A form of denial of service attack.
DOS Categories
Bandwidth Consumption
-attackers will consume all available bandwidth to a particular network
Resource Starvation
-focuses on consuming system resources rather than network resources (e.g. CPU utilization, memory, file-system quotas)
Programming Flaws
-failures of an application, or operating system to handle exceptional conditions (normally result when a user sends unintended data to the vulnerable element)
Routing and DNS attacks
-involves attackers manipulating routing table entries to deny service to legitimate systems or networks.
Poisoned Traffic
malformed or invalid data that can’t be properly handled
Brute-force resource
simply use up all available capacity
Stateful resource
take advantage of client/server relationship in protocols
POD
Ping of Death
Smurf/ping flooding/ICMP storm
Attacker sends a large stream of spoofed ping packets to a broadcast address (an IP address that services a network of computers)
Hosts reply to the victim
SYN Flooding
Exploits the synchronization protocol used to initiate connections
Resource Starvation Attack
One method utilizes two UDP services
-Echo: the server returns whatever the client sends
-Chargen: The server sends a datagram containing a random number of characters each time the client sends a datagram.
Now, an intruder will spoof a packet and connects the Echo service on one machine to the chargen service on another.
Teardrop attack
Some implementations of the TCP/IP IP fragmentation re-assembly code do not properly handle overlapping IP fragments. Teardrop is a widely available attack tool that exploits this vulnerability. Any remote user can crash a vulnerable machine.
Protection from DOS and DDOS attacks
Best way would seem to be to stop the attack before it happens
-Detect and Remove Trojans/zombies from servers, use file-integrity checking programs
Block “marching orders”
-e.g. one method to send the “attack” order is to send an unsolicited ICMP ping response – firewalls should be set to block this. Broadcasts should not send ping requests. Limit ability to spoof.
Block the attack at the source
Mitigating the Effects of DoS
Acknowledges that we can’t stop DoS
Harden the network
Avoid putting “all of your eggs in one basket”
Use Load balancers
can employ “delayed binds” which drop sessions
can also drop “Silent” TCP sessions
Adjust state limits (e.g. wait time)
PING (Acronym)
Packet Internet Groper
TCP SYN Scanning
“half open” scanning. Sends a SYN packet to each remote port. Open ports respond with a SYN/ACK packet. Closed ports usually respond with an RST packet.
TCP FIN Scanning
Sends a FIN packet (normally sent to clear connection when conversation is finished). Closed ports usually respond with an RST packet. Open ports usually ignore FIN packets.