Monday, 29 May 2023

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with mĂșltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related word
  1. Hacking Tools Github
  2. Pentest Tools Find Subdomains
  3. Pentest Tools Find Subdomains
  4. Hacks And Tools
  5. Pentest Tools Windows
  6. Hak5 Tools
  7. Tools Used For Hacking
  8. Hacker Tools Github
  9. Tools 4 Hack
  10. Hack Tool Apk
  11. Pentest Tools Bluekeep
  12. Hacker Hardware Tools
  13. Ethical Hacker Tools
  14. Hacking Tools Download
  15. Computer Hacker
  16. Hack Tools Mac
  17. Nsa Hack Tools Download
  18. Hacker Tools 2020
  19. Hacker Tools Mac
  20. Pentest Tools Url Fuzzer
  21. Hacking Tools Pc
  22. How To Hack
  23. Blackhat Hacker Tools
  24. Hacker Tools Apk Download
  25. Best Pentesting Tools 2018
  26. Computer Hacker
  27. Pentest Tools
  28. Hacker Search Tools
  29. Best Hacking Tools 2020
  30. Hacking Tools For Mac
  31. What Are Hacking Tools
  32. Hacking Tools 2020
  33. Hacking Tools Kit
  34. Android Hack Tools Github
  35. Best Hacking Tools 2019
  36. Pentest Tools Online
  37. Hack Tool Apk No Root
  38. Pentest Tools Port Scanner
  39. Usb Pentest Tools
  40. How To Install Pentest Tools In Ubuntu
  41. Pentest Tools For Ubuntu
  42. Pentest Tools Open Source
  43. Hacking Tools For Beginners
  44. Hacker Tools For Windows
  45. Hack Rom Tools
  46. Hacking Tools Name
  47. Hacks And Tools
  48. Usb Pentest Tools
  49. Pentest Tools For Mac
  50. Blackhat Hacker Tools
  51. Pentest Tools For Ubuntu
  52. Free Pentest Tools For Windows
  53. Best Hacking Tools 2019
  54. Hacking Tools Online
  55. Beginner Hacker Tools
  56. Beginner Hacker Tools
  57. Hack Tools
  58. Hack Tools For Pc
  59. Hacking Tools Hardware
  60. Pentest Tools Tcp Port Scanner
  61. Physical Pentest Tools
  62. Free Pentest Tools For Windows
  63. Android Hack Tools Github
  64. Hack Tools Mac
  65. Hack Tools For Mac
  66. Pentest Tools For Android
  67. Hacker Tools For Ios
  68. Hacker Tools For Windows
  69. Hack Tools Github
  70. Hacker Tools For Windows
  71. Best Pentesting Tools 2018
  72. Ethical Hacker Tools
  73. Pentest Tools Website
  74. Hacker Tools Free Download
  75. Pentest Recon Tools
  76. Bluetooth Hacking Tools Kali
  77. Pentest Tools Open Source
  78. Pentest Tools For Ubuntu
  79. Github Hacking Tools
  80. Hacking App
  81. Install Pentest Tools Ubuntu
  82. Hack Tools
  83. New Hack Tools
  84. Pentest Tools Subdomain
  85. Pentest Tools List
  86. Game Hacking
  87. Hacker
  88. Nsa Hacker Tools
  89. Game Hacking
  90. Hacking Tools Hardware
  91. Pentest Tools Url Fuzzer
  92. Underground Hacker Sites
  93. Hack Tools For Pc
  94. New Hack Tools
  95. New Hacker Tools
  96. Top Pentest Tools
  97. Hacker Tools Free
  98. Pentest Box Tools Download
  99. Pentest Tools Windows
  100. Pentest Tools For Ubuntu
  101. Pentest Tools Review
  102. Hack And Tools
  103. Pentest Tools Apk
  104. Hacker Techniques Tools And Incident Handling
  105. What Is Hacking Tools
  106. Hacking Tools Software
  107. Hack App
  108. Best Pentesting Tools 2018
  109. Pentest Tools Github
  110. Hacker Tools Apk
  111. Hacking Tools
  112. Hacking Tools 2020
  113. Hacking Tools Download
  114. Install Pentest Tools Ubuntu
  115. What Are Hacking Tools
  116. Hacking Apps
  117. Hack Tools 2019
  118. Hacking Tools Windows
  119. Hacking Tools Online
  120. Hacking Tools For Pc
  121. How To Hack
  122. World No 1 Hacker Software
  123. Bluetooth Hacking Tools Kali
  124. Pentest Tools Subdomain
  125. Hacker Tools
  126. Pentest Tools For Android
  127. Hacking Tools For Kali Linux
  128. Pentest Tools Find Subdomains
  129. Hacker Security Tools
  130. Hack App
  131. Pentest Tools Linux
  132. Github Hacking Tools
  133. Hack App
  134. Hacker Tools Linux
  135. Pentest Tools Nmap
  136. Hacker Tools Software
  137. Github Hacking Tools
  138. Hacking Tools Windows

No comments:

Post a Comment