Banking increasingly felt the sting of cyber attacks in 2015, after what was a hard year of DDoS and breaches against conpanies globally. From Finland, to Sweden, to Greece, to the US, cyber threats are becoming the new liability to plague the industry. In a report conducted by the Cyber Security Forum Initiative and PricewaterhouseCoopers, […]
Author: admin2
New amplification methods : RIP AND PORTMAP
To catch up on the latest amplification methods I decided to write this post to give a short review for them. RIP amplification method is a shortcutNew amplification methods : RIP AND PORTMAP for the Routing Information Protocol which is a UDP service working on port 520. Its amplification rate is pretty decent at about […]
A DDoS Attack : TCP SYN ACK Flood
Continuing on with explanations of attack vectors, we will be discussing a TCP SYN ACK flood. A TCP packet with the SYN ACK flag enabled is used as part of the three step process involved with establishing a TCP connection. 1. SYN packet. During this stage, a client (such as a desktop computer, laptop, or […]
DDoS, Baidu, and China’s Great Cannon
Recently the New York Times announced that CloudFlare has partnered with Internet search giant Baidu in China, Google’s eerily similar competitor, to deliver Yunjiasu, a CloudFlare-like service in China. The service is aimed at speeding up Internet connectivity and providing some level security services for its customers, including limited DDoS mitigation. It will likely operate similar to CloudFlare itself, with […]
A DDoS Attack Explained: TCP SYN Flood
A SYN flood is perhaps one of the most common forms of DDoS attack seen today. SYN floods rely on exploiting how a basic TCP connection is formed, essentially. TCP connections take place in three stages (commonly known as the three-way handshake): 1. SYN. During this stage, a client (such as a desktop computer, laptop, […]
A DDoS Attack Explained: HTTP Flood
HTTP floods are one of the most devastating types of DDoS attacks currently available to an attacker. It is an attack at the application layer (Layer 7 of the OSI model), meant to exhaust a system’s application resources. It is very easy to execute, doesn’t require a massive botnet or any sort of tricks to […]
Free Cloud Services and How They Are Used for DDoS
Free cloud services have become popular in recent years. These services provide developers a platform to test software, and collaborate with others easily. While this sounds amazing, in reality these platforms can be a goldmine for attackers if not properly secured. Many of these services require only an email for verification. Setting up fake emails […]
DYLD: The New Apple Zero Day Exploit
According to TechNewsWorld, “Malwarebytes has discovered a new zero day exploit in OS X that lets apps bypass passwords during installation to get root permission through a Unix shell.” The exploit installs an application that allows “anything to be installed anywhere”. There was a time when Mac users were a small contingent on the Internet […]
A History Lesson: Apple’s Patented Method for Amplifying DDoS
In late-1999, Apple was granted US Patent No 5,931,961 for Discovery of acceptable packet size using ICMP echo. A form of this mechanism was implemented in Mac OS 9 and was soon misused as a means of amplifying DDoS attacks . This patent is widely-cited by inventors at other Internet giants, but the mistake in its method […]
Fear and Loathing in TCP: Reexamining Hackers
In 1995, Angelina Jolie portrayed a computer hacker that went by the alias Acid Burn. At the time, I had limited access to movies, as well as most other forms of entertainment and culture. I was not aware of seminal hacker movies such as Wargames or Sneakers (if you have not yet seen these, drop […]
Tunneling Traffic Through DNS to Bypass Firewalls
Monitoring and analyzing your network traffic is more of an art form than a science: every network is unique. The differences appear in the services we run, the types of traffic we generate, as well as our network design and layout. In order to properly analyze traffic dumps, we must first know what kind of […]
Webair CTO Presents Multi-Layer DDoS Mitigation Strategies
In a recent presentation to LinuxCon attendees, Webair CTO Sagi Brody and Senior Infrastructure Engineer Logan Best discussed the current dynamics of DDoS attacks and mitigation methods, and we’re pleased to have been included and provide some statistics for them. Beginning from the target server all the way to 3rd party protection, Brody describes ways […]
Staminus Chooses Advania As Its Official DDoS Partner in Iceland
Staminus has teamed up with the multi-service IT company Advania to defend their Iceland-based clients. With 70 years of experience in the field of technology services, Advania is the largest business of its kind in Iceland, and was the ideal partner to help establish a quality defense against Distributed Denial-of-Service (DDoS) attacks in the country. […]
WordPress Real IP detector
This plugin allow WordPress to detect visitors Real IP Address when WordPress is behind of Reverse Proxy, Load Balancer. It will start working as soon as you activate it. It is also compatible: Cloudflare.com geniusguard.com central-hosting.com incapsula.com sucuri.net barracuda.com f5.com And Other… Real IP Detector
Everything About TCP ACK Flood
We’re continuing along with our explanations of types of DDoS attacks today, with emphasis on the TCP ACK flood. Much like we discussed on Tuesday, this form of attack is a part of making a TCP connection. When a client establishes a TCP connection to a server, the connection goes through a three step process. […]
The 5000 Pound iPhone: Your Smart Car
Everyone wants to be the new next best thing. We hear quite often about the “iPhone killer”, but that has not occurred to date. There is also an understanding that all new technology comes with security risks (which is how so many devices end up as DDoS sources). So it’s becoming real interesting to watch the automotive industry […]
Stopping DDoS at an Internet Exchange
A network suffering from a DDoS attack can trigger a blackhole route to the attacked IP and save their network. When other networks see this null route, they no longer know where to send the data for that particular IP address. All of that data is simply dropped (into a black hole!) by their routers. […]
A DDoS Attack Explained: HTTP Flood
HTTP floods are one of the most devastating types of DDoS attacks currently available to an attacker. It is an attack at the application layer (Layer 7 of the OSI model), meant to exhaust a system’s application resources. It is very easy to execute, doesn’t require a massive botnet or any sort of tricks to […]
Responding to advanced threats with a SIEM is like playing ‘Where’s Waldo’ with your Network
When alerts get escalated, what’s your go-to solution to validate and track the threat? When monitoring a recognized breach to see what happens next, what do you rely on to make sure you see the attacker’s every move throughout your network? If you’re like most enterprises, you were sold a bill of goods with Security […]
DDoS attack size is getting bigger
DDoS attacks aren’t going away anytime soon. In fact, they’re getting bigger, according to network security company Arbor Networks. But there’s good news for potential attacks in the Internet of Things arena—some heat is off there. DDoS, or Distributed Denial-of-Service, attacks are where numerous compromised computers are used to target a single system. In simple terms, […]