Denial-of-Service Attack Technique
Denial-of-Service
Attack Technique
Attack
tools
In cases such as MyDoom the
tools are embedded in malware, and launch their attacks without the knowledge
of the system owner. Stacheldraht is a classic example of a DDoS tool. It uses
a layered structure where the attacker uses a client program to connect to handlers,
which are compromised systems that issue commands to the zombie agents,
which in turn facilitate the DDoS attack. Agents are compromised via the
handlers by the attacker, using automated routines to exploit vulnerabilities
in programs that accept remote connections running on the targeted remote
hosts. Each handler can control up to a thousand agents.
In other cases a machine may become
part of a DDoS attack with the owner's consent, for example, in Operation
Payback, organized by the group Anonymous.
The LOIC has typically been used in this way.
Along with HOIC a wide variety of DDoS tools are
available today, including paid and free versions, with different features
available. There is an underground market for these in hacker related forums
and IRC channels.
UK's GCHQ has tools built
for DDoS, named PREDATORS FACE and ROLLING THUNDER.
Application-layer
floods
Various DoS-causing exploits such as buffer overflow can
cause server-running software to get confused and fill the disk space or
consume all available memory or CPU time.
Other kinds of DoS rely primarily on
brute force, flooding the target with an overwhelming flux of packets,
oversaturating its connection bandwidth or depleting the target's system
resources. Bandwidth-saturating floods rely on the attacker having higher
bandwidth available than the victim; a common way of achieving this today is
via distributed denial-of-service, employing a botnet.
Another target of DDoS attacks may be to produce added costs for the
application operator, when the latter uses resources based on cloud computing.
In this case normally application used resources are tied to a needed Quality
of Service level (e.g. responses should be less than 200 ms) and this rule is
usually linked to automated software (e.g. Amazon CloudWatch)
to raise more virtual resources from the provider in order to meet the defined
QoS levels for the increased requests.The main incentive behind such attacks
may be to drive the application owner to raise the elasticity levels in order
to handle the increased application traffic, in order to cause financial losses
or force them to become less competitive. Other floods may use specific packet
types or connection requests to saturate finite resources by, for example,
occupying the maximum number of open connections or filling the victim's disk
space with logs.
A "banana attack" is
another particular type of DoS. It involves redirecting outgoing messages from
the client back onto the client, preventing outside access, as well as flooding
the client with the sent packets. A LAND attack is of
this type.
An attacker with shell-level access
to a victim's computer may slow it until it is unusable or crash it by using
a fork bomb.
A kind of application-level DoS
attack is XDoS (or
XML DoS) which can be controlled by modern web application firewalls (WAFs).
Degradation-of-service
attacks
"Pulsing" zombies are
compromised computers that are directed to launch intermittent and short-lived
floodings of victim websites with the intent of merely slowing it rather than
crashing it. This type of attack, referred to as "degradation-of-service"
rather than "denial-of-service", can be more difficult to detect than
regular zombie invasions and can disrupt and hamper connection to websites for
prolonged periods of time, potentially causing more disruption than
concentrated floods. Exposure
of degradation-of-service attacks is complicated further by the matter of
discerning whether the server is really being attacked or under normal traffic
loads.
Denial-of-service
Level II
The goal of DoS L2 (possibly DDoS)
attack is to cause a launching of a defense mechanism which blocks the network
segment from which the attack originated. In case of distributed attack or IP
header modification (that depends on the kind of security behavior) it will
fully block the attacked network from the Internet, but without system crash.
Distributed
DoS attack
A distributed denial-of-service
(DDoS) attack occurs when multiple systems flood the bandwidth or resources of
a targeted system, usually one or more web servers. Such
an attack is often the result of multiple compromised systems (for example, a
botnet) flooding the targeted system with traffic. A botnet is a network of
zombie computers programmed to receive commands without the owners' knowledge. When
a server is overloaded with connections, new connections can no longer be
accepted. The major advantages to an attacker of using a distributed
denial-of-service attack are that multiple machines can generate more attack
traffic than one machine, multiple attack machines are harder to turn off than
one attack machine, and that the behavior of each attack machine can be
stealthier, making it harder to track and shut down. These attacker advantages
cause challenges for defense mechanisms. For example, merely purchasing more
incoming bandwidth than the current volume of the attack might not help,
because the attacker might be able to simply add more attack machines. This,
after all, will end up completely crashing a website for periods of time.
Malware can carry DDoS attack
mechanisms; one of the better-known examples of this was MyDoom.
Its DoS mechanism was triggered on a specific date and time. This type of DDoS
involved hardcoding the target IP address prior to release of the malware and
no further interaction was necessary to launch the attack.
A system may also be compromised with
a trojan, allowing the attacker to download
a zombie agent, or the trojan may contain one.
Attackers can also break into systems using automated tools that exploit flaws
in programs that listen for connections from remote hosts. This scenario
primarily concerns systems acting as servers on the web. Stacheldraht is
a classic example of a DDoS tool. It uses a layered structure where the
attacker uses a client program to connect to handlers,
which are compromised systems that issue commands to the zombie agents,
which in turn facilitate the DDoS attack. Agents are compromised via the
handlers by the attacker, using automated routines to exploit vulnerabilities
in programs that accept remote connections running on the targeted remote
hosts. Each handler can control up to a thousand agents. In
some cases a machine may become part of a DDoS attack with the owner's consent,
for example, in Operation Payback, organized by the group Anonymous.
These attacks can use different types of internet packets such as: TCP, UDP, ICMP
etc.
These collections of systems
compromisers are known as botnets / rootservers.
DDoS tools like Stacheldraht still use classic DoS attack methods
centered on IP spoofing and amplification like smurf attacks and fraggle attacks (these
are also known as bandwidth consumption attacks). SYN floods (also
known as resource starvation attacks) may also be used. Newer tools can use DNS
servers for DoS purposes. Unlike MyDoom's DDoS mechanism, botnets can be turned
against any IP address. Script kiddies use
them to deny the availability of well known websites to legitimate users. More
sophisticated attackers use DDoS tools for the purposes of extortion –
even against their business rivals.
Simple attacks such as SYN floods may
appear with a wide range of source IP addresses, giving the appearance of a
well distributed DoS. These flood attacks do not require completion of the
TCP three way handshake and attempt to exhaust
the destination SYN queue or the server bandwidth. Because the source IP
addresses can be trivially spoofed, an attack could come from a limited set of
sources, or may even originate from a single host. Stack enhancements such
as syn cookies may
be effective mitigation against SYN queue flooding, however complete bandwidth
exhaustion may require involvement.
If an attacker mounts an attack from
a single host it would be classified as a DoS attack. In fact, any attack
against availability would be classed as a denial-of-service attack. On the
other hand, if an attacker uses many systems to simultaneously launch attacks
against a remote host, this would be classified as a DDoS attack.
It has been reported that there are
new attacks from internet of things which have been
involved in denial of service attacks. In
one noted attack that was made peaked at around 20,000 requests per second
which came from around 900 CCTV cameras.
UK's GCHQ has tools built
for DDoS, named PREDATORS FACE and ROLLING THUNDER.
DDoS
extortion
In 2015, DDoS botnets such as DD4BC
grew in prominence, taking aim at financial institutions. Cyber-extortionists
typically begin with a low-level attack and a warning that a larger attack will
be carried out if a ransom is not paid in Bitcoin. Security
experts recommend targeted websites to not pay the ransom. The attackers tend
to get into an extended extortion scheme once they recognize that the target is
ready to pay.
HTTP
POST DoS attack
First discovered in 2009, the HTTP
POST attack sends a complete, legitimate HTTP POST header,
which includes a 'Content-Length' field to specify the size of the message body
to follow. However, the attacker then proceeds to send the actual message body
at an extremely slow rate (e.g. 1 byte/110 seconds). Due to the entire message
being correct and complete, the target server will attempt to obey the
'Content-Length' field in the header, and wait for the entire body of the
message to be transmitted, which can take a very long time. The attacker
establishes hundreds or even thousands of such connections, until all resources
for incoming connections on the server (the victim) are used up, hence making
any further (including legitimate) connections impossible until all data has
been sent. It is notable that unlike many other (D)DoS attacks, which try to
subdue the server by overloading its network or CPU, a HTTP POST attack targets
the logical resources of the victim, which means the victim
would still have enough network bandwidth and processing power to operate. Further
combined with the fact that Apache will, by default, accept requests
up to 2GB in size, this attack can be particularly powerful. HTTP POST attacks
are difficult to differentiate from legitimate connections, and are therefore
able to bypass some protection systems. OWASP, an open source web
application security project, has released a testing tool to
test the security of servers against this type of attacks.
Internet
Control Message Protocol (ICMP) flood
A smurf attack relies
on misconfigured network devices that allow packets to be sent to all computer
hosts on a particular network via the broadcast
address of the network, rather than a specific machine. The
attacker will send large numbers of IP packets
with the source address faked to appear to be the address of the victim. The
network's bandwidth is quickly used up, preventing legitimate packets from
getting through to their destination.
Ping flood is
based on sending the victim an overwhelming number of ping packets, usually using the
"ping" command from Unix-like hosts
(the -t flag on Windows systems is much less capable of
overwhelming a target, also the -l (size) flag does not allow sent packet size
greater than 65500 in Windows). It is very simple to launch, the primary
requirement being access to greater bandwidth than the victim.
Ping of death is
based on sending the victim a malformed ping packet, which will lead to a
system crash on a vulnerable system.
The BlackNurse attack is an example of an
attack taking advantage of the required Destination Port Unreachable ICMP
packets.
Nuke
A Nuke is an old denial-of-service
attack against computer networks consisting of fragmented
or otherwise invalid ICMP packets sent to
the target, achieved by using a modified ping utility to repeatedly send this
corrupt data, thus slowing down the affected computer until it comes to a
complete stop.
A specific example of a nuke attack
that gained some prominence is the WinNuke,
which exploited the vulnerability in the NetBIOS handler
in Windows 95.
A string of out-of-band data was sent to TCP port 139 of the victim's machine,
causing it to lock up and display a Blue Screen of Death (BSOD).
Peer-to-peer
attacks
Attackers have found a way to exploit
a number of bugs in peer-to-peer servers to initiate DDoS attacks. The most
aggressive of these peer-to-peer-DDoS attacks exploits DC++.
With peer-to-peer there is no botnet and the attacker does not have to
communicate with the clients it subverts. Instead, the attacker acts as a
"puppet master," instructing clients of large peer-to-peer
file sharing hubs to disconnect from their peer-to-peer network
and to connect to the victim's website instead.
Permanent
denial-of-service attacks
Permanent denial-of-service (PDoS),
also known loosely as phlashing, is
an attack that damages a system so badly that it requires replacement or
reinstallation of hardware. Unlike
the distributed denial-of-service attack, a PDoS attack exploits security flaws
which allow remote administration on the management interfaces of the victim's
hardware, such as routers, printers, or other networking hardware. The attacker uses these
vulnerabilities to replace a device's firmware with
a modified, corrupt, or defective firmware image—a process which when done
legitimately is known as flashing. This therefore "bricks" the device, rendering it unusable
for its original purpose until it can be repaired or replaced.
The PDoS is a pure hardware targeted
attack which can be much faster and requires fewer resources than using a
botnet or a root/vserver in a DDoS attack. Because of these features, and the
potential and high probability of security exploits on Network Enabled Embedded
Devices (NEEDs), this technique has come to the attention of numerous hacking
communities.
PhlashDance is a tool created by Rich
Smith (an employee of Hewlett-Packard's Systems Security Lab) used to detect
and demonstrate PDoS vulnerabilities at the 2008EUSecWest
Applied Security Conference in London.
Reflected
/ spoofed attack
A distributed denial-of-service
attack may involve sending forged requests of some type to a very large number
of computers that will reply to the requests. Using Internet Protocol address spoofing, the source
address is set to that of the targeted victim, which means all the replies will
go to (and flood) the target. (This reflected attack form is sometimes called a
"DRDOS". )
ICMP Echo
Request attacks (Smurf attack)
can be considered one form of reflected attack, as the flooding host(s) send
Echo Requests to the broadcast addresses of mis-configured networks, thereby
enticing hosts to send Echo Reply packets to the victim. Some early DDoS
programs implemented a distributed form of this attack.
Amplification
Amplification attacks are used to
magnify the bandwidth that is sent to a victim. This is typically done through
publicly accessible DNS servers that are used to cause congestion on the target
system using DNS response traffic. Many services can be exploited to act as
reflectors, some harder to block than others. US-CERT
have observed that different services implies in different amplification
factors, as you can see below:
UDP-based Amplification
Attacks
|
|
Protocol
|
Bandwidth Amplification
Factor
|
NTP
|
556.9
|
CharGen
|
358.8
|
DNS
|
up to 179
|
QOTD
|
140.3
|
Quake Network Protocol
|
63.9
|
BitTorrent
|
4.0 - 54.3
|
SSDP
|
30.8
|
Kad
|
16.3
|
SNMPv2
|
6.3
|
Steam Protocol
|
5.5
|
NetBIOS
|
3.8
|
DNS amplification attacks involve a
new mechanism that increased the amplification effect, using a much larger list
of DNS servers than seen earlier. The process typically involves an attacker
sending a DNS name look up request to a public DNS server, spoofing the source
IP address of the targeted victim. The attacker tries to request as much zone
information as possible, thus amplifying the DNS record response that is sent
to the targeted victim. Since the size of the request is significantly smaller
than the response, the attacker is easily able to increase the amount of
traffic directed at the target. SNMP
and NTP can also be exploited as reflector in
an amplification attack.
An example of an amplified DDoS
attack through NTP is through a command called monlist, which sends the details
of the last 600 people who have requested the time from that computer back to
the requester. A small request to this time server can be sent using a spoofed
source IP address of some victim, which results in 556.9 times the amount of
data that was requested back to the victim. This becomes amplified when using
botnets that all send requests with the same spoofed IP source, which will send
a massive amount of data back to the victim.
It is very difficult to defend
against these types of attacks because the response data is coming from
legitimate servers. These attack requests are also sent through UDP, which does
not require a connection to the server. This means that the source IP is not
verified when a request is received by the server. In order to bring awareness
of these vulnerabilities, campaigns have been started that are dedicated to
finding amplification vectors which has led to people fixing their resolvers or
having the resolvers shut down completely.
R-U-Dead-Yet?
(RUDY)
RUDY attack targets
web applications by starvation of available sessions on the web server. Much
like Slowloris, RUDY keeps sessions at halt using
never-ending POST transmissions and sending an arbitrarily large content-length
header value.
Shrew
attack
The shrew attack is a
denial-of-service attack on the Transmission Control Protocol. It uses
short synchronized bursts of traffic to disrupt TCP connections on the same
link, by exploiting a weakness in TCP's retransmission timeout mechanism.
Slow
Read attack
A slow read attack sends legitimate
application layer requests, but reads responses very slowly, thus trying to
exhaust the server's connection pool. It is achieved by advertising a very
small number for the TCP Receive Window size, and at the same time emptying
clients' TCP receive buffer slowly, which causes a very low data flow rate.
Sophisticated
low-bandwidth Distributed Denial-of-Service Attack
A sophisticated low-bandwidth DDoS
attack is a form of DoS that uses less traffic and increases their
effectiveness by aiming at a weak point in the victim's system design, i.e.,
the attacker sends traffic consisting of complicated requests to the system. Essentially,
a sophisticated DDoS attack is lower in cost due to its use of less traffic, is
smaller in size making it more difficult to identify, and it has the ability to
hurt systems which are protected by flow control mechanisms.
(S)SYN
flood
A SYN flood occurs
when a host sends a flood of TCP/SYN packets, often with a forged sender
address. Each of these packets are handled like a connection request, causing
the server to spawn a half-open connection, by sending back a
TCP/SYN-ACK packet (Acknowledge), and waiting for a packet in response from the
sender address (response to the ACK Packet). However, because the sender
address is forged, the response never comes. These half-open connections
saturate the number of available connections the server can make, keeping it
from responding to legitimate requests until after the attack ends.
Teardrop
attacks
A teardrop attack involves
sending mangled IP fragments
with overlapping, oversized payloads to the target machine. This can crash
various operating systems because of a bug in their TCP/IP fragmentation
re-assembly code. Windows 3.1x, Windows 95 and Windows NT operating
systems, as well as versions of Linux prior to
versions 2.0.32 and 2.1.63 are vulnerable to this attack.
(Although in September 2009, a
vulnerability in Windows Vista was referred to as a
"teardrop attack", this targeted SMB2 which is a higher layer than the TCP
packets that teardrop used).
One of the fields in an IP header is
the “fragment offset” field, indicating the starting position, or offset, of
the data contained in a fragmented packet relative to the data in the original
packet. If the sum of the offset and size of one fragmented packet differs from
that of the next fragmented packet, the packets overlap. When this happens, a
server vulnerable to teardrop attacks is unable to reassemble the packets -
resulting in a denial-of-service condition.
Telephony
denial-of-service (TDoS)
Voice over IP has
made abusive origination of large numbers of telephone voice
calls inexpensive and readily automated while permitting call origins to be
misrepresented throughcaller ID spoofing.
According to the US Federal Bureau of Investigation, telephony
denial-of-service (TDoS) has appeared as part of various fraudulent schemes:
·
A
scammer contacts the victim's banker or broker, impersonating the victim to
request a funds transfer. The banker's attempt to contact the victim for
verification of the transfer fails as the victim's telephone lines are being
flooded with thousands of bogus calls, rendering the victim unreachable.
·
A
scammer contacts consumers with a bogus claim to collect an outstanding payday loan for
thousands of dollars. When the consumer objects, the scammer retaliates by
flooding the victim's employer with thousands of automated calls. In some
cases, displayed caller ID is spoofed to impersonate police or law enforcement
agencies.
·
A
scammer contacts consumers with a bogus debt collection demand and threatens to
send police; when the victim balks, the scammer floods local police numbers
with calls on which caller ID is spoofed to display the victims number. Police
soon arrive at the victim's residence attempting to find the origin of the
calls.
Telephony denial-of-service can exist
even without Internet telephony. In the 2002 New
Hampshire Senate election phone jamming scandal, telemarketers were
used to flood political opponents with spurious calls to jam phone banks on
election day. Widespread publication of a number can also flood it with enough
calls to render it unusable, as happened by accident in 1981 with multiple +1-area code-867-5309
subscribers inundated by hundreds of misdialed calls daily in response to the
song 867-5309/Jenny.
TDoS differs from other telephone harassment (such as prank calls and obscene phone calls) by the number of calls
originated; by occupying lines continuously with repeated automated calls, the
victim is prevented from making or receiving both routine and emergency
telephone calls.
Related exploits include SMS flooding attacks
and black fax or
fax loop transmission.
fabulous
ReplyDelete