Friday, June 2, 2023

Vulcan DoS Vs Akamai

In the past I had to do several DoS security audits, with mĂșltiples types of tests and intensities. Sometimes several DDoS protections were present like Akamai for static content, and Arbor for absorb part of the bandwith.

One consideration for the DoS/DDoS tools is that probably it will loss the control of the attacker host, and the tool at least has to be able to stop automatically with a timeout, but can also implement remote response checks.

In order to size the minimum mbps needed to flood a service or to retard the response in a significant amount of time, the attacker hosts need a bandwith limiter, that increments in a logarithmic way up to a limit agreed with the customer/isp/cpd.

There are DoS tools that doesn't have this timeouts, and bandwith limit based on mbps, for that reason I have to implement a LD_PRELOAD based solution: bwcontrol

Although there are several good tools for stressing web servers and web aplications like apache ab, or other common tools used for pen-testing, but I also wrote a fast web flooder in c++ named wflood.

As expected the most effective for taking down the web server are the slow-loris, slow-read and derivatives, few host were needed to DoS an online banking. 
Remote attacks to database and highly dynamic web content were discarded, that could be impacted for sure.

I did another tool in c++ for crafting massive tcp/udp/ip malformed packets, that impacted sometimes on load balancers and firewalls, it was vulcan, it freezed even the firewall client software.

The funny thing was that the common attacks against Akamai hosts, where ineffective, and so does the slow-loris family of attacks, because are common, and the Akamai nginx webservers are well tunned. But when tried vulcan, few intensity was enough to crash Akamai hosts.

Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.

And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.

Related links
  1. Hacking Tools Windows 10
  2. Hacker Tools Online
  3. Hack Apps
  4. Pentest Tools Linux
  5. Pentest Tools Url Fuzzer
  6. Install Pentest Tools Ubuntu
  7. Pentest Tools Nmap
  8. Hack Tools For Games
  9. Pentest Tools Alternative
  10. Pentest Tools For Ubuntu
  11. Hack Website Online Tool
  12. Tools Used For Hacking
  13. Pentest Tools Apk
  14. Pentest Tools
  15. Hacker Tools Apk
  16. Pentest Tools Tcp Port Scanner
  17. Pentest Tools For Windows
  18. Hacking Tools For Windows 7
  19. New Hack Tools
  20. Hacker Tools For Windows
  21. Pentest Tools Github
  22. Hacker Search Tools
  23. Termux Hacking Tools 2019
  24. Pentest Tools Alternative
  25. Hacking Tools Hardware
  26. Easy Hack Tools
  27. Hack App
  28. Hacking Tools For Games
  29. Hack Website Online Tool
  30. Hacker Security Tools
  31. Pentest Tools Github
  32. Pentest Tools Port Scanner
  33. Hacker Tools 2019
  34. Growth Hacker Tools
  35. Pentest Tools Website
  36. Hacker Search Tools
  37. Hacker Tools For Windows
  38. Hacking App
  39. Pentest Tools Tcp Port Scanner
  40. Hack Apps
  41. Pentest Tools For Ubuntu
  42. New Hacker Tools
  43. Hack App
  44. Game Hacking
  45. Hacking Tools 2020
  46. Hacker
  47. What Is Hacking Tools
  48. Pentest Tools Free
  49. Free Pentest Tools For Windows
  50. Hacking Tools For Pc
  51. Pentest Tools Website Vulnerability
  52. Beginner Hacker Tools
  53. Hacking Tools
  54. World No 1 Hacker Software
  55. Pentest Tools Port Scanner
  56. Hacking Tools
  57. Hacking Tools For Pc
  58. Pentest Tools Port Scanner
  59. Hacking Tools
  60. Hack Tool Apk
  61. Hack Rom Tools
  62. Black Hat Hacker Tools
  63. Pentest Tools Website
  64. Hacking Tools For Kali Linux
  65. Hacking Tools And Software
  66. Github Hacking Tools
  67. Best Pentesting Tools 2018
  68. Pentest Tools Website Vulnerability
  69. What Is Hacking Tools
  70. Underground Hacker Sites
  71. Black Hat Hacker Tools
  72. Hack Rom Tools
  73. Github Hacking Tools
  74. Pentest Tools Free
  75. Hacker
  76. Pentest Tools For Ubuntu
  77. Hacks And Tools
  78. What Are Hacking Tools
  79. Install Pentest Tools Ubuntu
  80. Hacker Tools Mac
  81. Hacker Tools Apk Download
  82. Pentest Tools Android
  83. Termux Hacking Tools 2019
  84. Hack Tools For Games
  85. Best Hacking Tools 2019
  86. Pentest Tools Open Source
  87. Hacking Tools For Kali Linux
  88. Hack Tools Pc
  89. Pentest Tools For Mac
  90. Pentest Tools Alternative
  91. Hacking Tools 2019
  92. Hacker
  93. Hacker Tools For Ios
  94. Hacking Tools For Mac
  95. Hacker Tools
  96. How To Install Pentest Tools In Ubuntu
  97. Hacker Search Tools
  98. Hack Website Online Tool
  99. Hacker Tools For Mac
  100. Computer Hacker
  101. Pentest Tools Open Source
  102. Top Pentest Tools
  103. Hack Website Online Tool
  104. Pentest Tools Github
  105. Hacking App
  106. Tools Used For Hacking
  107. Hacker Search Tools
  108. Hacking Tools Mac
  109. Pentest Tools Download
  110. Nsa Hacker Tools
  111. Hack Tools For Pc
  112. Hackers Toolbox
  113. Hacking Tools Online
  114. Hacking Tools For Windows
  115. Hacking Tools For Pc
  116. Pentest Tools Review
  117. How To Hack
  118. Nsa Hacker Tools
  119. Pentest Tools Review
  120. Hack Tools Github
  121. Hack Tool Apk No Root
  122. Hacking Tools Windows 10
  123. Easy Hack Tools
  124. Termux Hacking Tools 2019
  125. Hacker Tools Mac
  126. Android Hack Tools Github
  127. Bluetooth Hacking Tools Kali
  128. Hacker Tools For Windows
  129. Pentest Tools Github
  130. Growth Hacker Tools
  131. Hacking Tools Usb
  132. Hack Tools 2019
  133. Hacker Tools Github
  134. Hack Tools For Ubuntu
  135. Top Pentest Tools
  136. Hacker Tools List
  137. Hack Tools 2019
  138. Pentest Recon Tools
  139. Pentest Tools For Android
  140. Hack Tools Github
  141. Hacker Tools
  142. Hacker Tools Software

No comments:

Post a Comment