Deniel Of Service - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Deniel Of Service

Description:

1. Politeknik Elektronika Negeri Surabaya. ITS - Surabaya. Deniel Of Service. Isbat Uzzin Nadhori ... When successful, the targeted host may stop providing any ... – PowerPoint PPT presentation

Number of Views:35
Avg rating:3.0/5.0
Slides: 17
Provided by: Cli18
Category:

less

Transcript and Presenter's Notes

Title: Deniel Of Service


1
Deniel Of Service
  • Isbat Uzzin Nadhori
  • Informatical Engineering PENS-ITS

2
Overview
  • Denial of Service (DoS) is the act of performing
    an attack which prevents the system from
    providing services to legitimate users
  • When successful, the targeted host may stop
    providing any service, provide limited services
    only or provide services to some users only

3
Overview
  • DoS can be achieved in various ways
  • Application Crashing
  • Memory Access Violation (Buffer Overflow)
  • Various Exceptions
  • Data Destruction
  • Resource Depletion
  • Memory
  • CPU
  • Bandwidth
  • Disk Space

4
Application Crashing
  • Common way of performing a Denial of Service
    attack
  • In many cases, certain types of inputs may yield
    an error in the application which it did not
    anticipate, and will cause it to crash
  • Buffer Overflows
  • Malformed data causing parser exception
  • Terminating with error
  • SQL Injection ( shutdown --)

5
Data Destruction
  • One way to cause a DoS attack is by tampering
    with the data instead of the service itself
  • If a site is vulnerable to SQL Injection, for
    instance, it may be possible to DELETE all data
    from all tables
  • Although the Web site will keep being online,
    it will actually be useless without the
    information from the Database

6
Data Destruction
  • Intentional User Lock
  • Any web application login page
  • Taking advantage of the application security
    mechanisms to cause DoS by abusing the login
    failure user lock mechanism
  • Intentionally failing multiple login attempts
    with each possible username, will eventually
    result in DoS, since all the application users
    will be locked

7
Resource Depletion
  • Sophisticated attacks pinpoint the weak points of
    the application to achieve maximum effect using
    minimal resources
  • CPU Consumption
  • An attacker can easily create complicated regular
    expressions which consume a lot of CPU each time
    a search is initiated
  • The attacker then writes a script to launch this
    request over and over again

8
Resource Depletion
  • CPU Consumption The SQL Injection version
  • When SQL Injection is possible can be used for
    DoS even without permissions to Shutdown or
    Delete
  • Creating very intense nested queries does the
    trick

9
Resource Depletion
  • Memory Consumption
  • A Web Mail Application
  • Allows uploading files for attachment
  • All attachments are stored in the applications
    memory until the Send button is sent
  • There is no limitation on the size or number of
    attachments
  • Assuming the hacker has a lot of bandwidth, the
    hacker can upload thousands of attachments,
    consuming all free memory in the machine

10
Resource Depletion
  • Disk Consumption
  • Any web application
  • Detailed logging is used for each application
    error
  • An attacker identifies a light-weight request
    which can generate a few KB of log
  • The attacker then repeats this until the Disk is
    full
  • Application behavior once Disk is full is
    unexpected
  • Application might terminate when not being able
    to write to a file
  • If the files are located on the system
    partitions, the entire machine might crash

11
Resource Depletion
  • Network Consumption
  • Any web application
  • Attacker has wide Internet connection
  • Attacker identifies small requests which result
    in large amounts of data (Display all items in
    system)
  • Attacker can then launch the request over and
    over again, causing the database to send large
    amounts of data back to the web server in each
    request (potentially exhausting the connection
    pool as well)

12
DoS Type
  • TCP DoS Attack
  • LAND a series of SYN, cause system to crash
    and/or restart. For example, when src address
    dest address may crash some OS with
    vulnerability. New Window and Linux had improved
    to prevent LAND attack
  • Teardrop re-assembly of fragmented packet that
    is bigger or smaller that it suppose to be will
    cause system to crash or stop a certain service.
  • TCP SYN many 3-ways handshaking that consume
    system resource gt system crashed or simply no
    response (out of memory)
  • UDP DoS Attack
  • Fraggle similar to TCP SYN but with UDP.
  • ICMP DoS Attack
  • Ping of Death small icmp echo request will
    cause server to response echo reply. Attack
    packet add data in Option Data to make the packet
    very big. Victims resource will be consumpted
    due to the reply packets (i.e. need to resend
    when no response) cause significant resource
    starvation. In some case, the packet size is more
    than 65535bytes, causing the system to crash..
    New OS has fixed this problem.
  • Smurf use IP Spoofed, that will cause a lot of
    flooded echo reply packet.
  • DNS Replay Flooding

13
DoS Methods
14
DDoS
  • An attacker finds a group of computer that he/she
    can break into or installing software and
    running programs)
  • This collection computer are then taken over and
    turned into zombies
  • The zombies flood a web site with requests
  • Legitimate requests are blocked

15
Defense
  • There are techniques to avoid some DoS attacks at
    the code level
  • Perform thorough input validations. Expect for
    the worst!
  • Avoid highly CPU consuming operations
  • Try to create as little as possible bottlenecks
  • Avoid operations which must wait for completion
    of large tasks to proceed
  • Split operations to chunks
  • Set timeout timers for unreasonable time
  • Prepare for performance peaks
  • More Load Balancing
  • Caching
  • Always separate the data disks from theSystem
    disks

16
Defense
  • Put limit on ping to prevent flood pings
  • iptables -A INPUT -p icmp --icmp-type
    echo-request \
  •   -m limit --limit 1/s -i eth0 -j ACCEPT
  • Defense for SYN flood attacks
  • m limit sets maximum number of SYN packets
  • iptables -A INPUT -p tcp --syn -m limit --limit
    5/s -i eth0 -j ACCEPT
Write a Comment
User Comments (0)
About PowerShow.com