ddos mitigation collection
play

DDoS Mitigation collection TL;DR: DDOS STRATEGISTS DO DRUGS Agenda - PowerPoint PPT Presentation

1 DDoS Mitigation collection TL;DR: DDOS STRATEGISTS DO DRUGS Agenda 2 Intro Methodology of work DDoS tactics in-the-wild and how to improve Ready, set, FACEPALM! Q&A ~$ whoami 3 Moshe Zioni, Head of Research,


  1. 1 DDoS Mitigation collection TL;DR: DDOS STRATEGISTS DO DRUGS

  2. Agenda 2  Intro  Methodology of work  DDoS tactics in-the-wild and how to improve  Ready, set, FACEPALM!  Q&A

  3. ~$ whoami 3  Moshe Zioni, Head of Research, Comsec  3 years (and counting) of designing & providing full-blown an on-demand DDoS attack service. 2 nd time at hack-in-paris, 1 st time as speaker (thanks!)   .///. END OF SHAMELESS PROMOTION SLIDE .///.

  4. Method 4

  5. DDoS for Everyone! 5

  6. Run-of-the-Mill DDoS attacks 6 nowadays  Rely heavily on bandwidth consumption  53% of attacks are < 2Gbps (SANS)  Most attacks does not require brains  Amplification and Reflection relies on 3 rd party domains (DNS, NTP etc.)

  7. Strike harder! (!=bigger) 7  There is more to a web site then a front-end (!!)  Overload the backend by making the system work for you  Keep it stealthy, they are looking for you  Generalized term for Amplification

  8. Generalized Amplification - “ 4 Pillars ” 8  Amplification factors  Network – The usual suspect  CPU – Very limited on some mediators and web application servers  Memory – Volatile, everything uses it  Storage – Can be filled up or exhausting I/O buffer

  9. Just before we start 9  NO SHAMING POLICY - Client identity will remain anonymous  Meet - “ SuperBank ”  10 common-practices and the appropriate bypass/attack

  10. Ready? 10 Set. FACEPALM!

  11. 11

  12. “ Limit the rate 12 of incoming packets ”

  13. 13  The bank has been hit by a DDoS attack that consumed ALL BANDWIDTH  To rectify the situation the ISP suggested limiting incoming packet rate to ensure availability

  14. Reflection to the rescue! 14 Send in 1Kb Consume according to file-length Consumption by reflection

  15. 15

  16. “ It ’ s OK now, 16 monitoring shows everything is back to normal ”

  17. 17  MegaCommonPractive now went on to buy a Anti-DDoS solution  A known Anti-DDoS cloud-based protection solution approached the client and offered a very solid looking solution including 24/7 third party monitoring

  18. 18 ACTUALLY TRY TO ACCESS THE WEB SITE!!!!

  19. 19

  20. “ Backend servers 20 are not important to protect against DDoS ”

  21. Mapping the backend for DDoS 21  Databases are very susceptible to DDoS attacks and provide good grounds for intra-amplification  How can we find DBs?  You can always guess, pentersters do that all the time …  Takes more time == talk more with BE !!! PROFIT!!!

  22. 22

  23. 23

  24. Really??!?! ALL OF THE DOMAINS?!? 24  What is the strategy of mitigation? Do you understand it?

  25. 25

  26. “ We don ’ t trust 26 the vendor, we don ’ t give them certificates ”

  27. Talk to me in layer 7 … 27  Defense have chosen not to monitor layer 7 – HTTPS attacks..  SSL re/negotiation  Full blown HTTPS GET/POST/ … no one can see you now

  28. 28

  29. “ We need Big 29 Data, collect all the logs ”

  30. Logs need to be handled 30  Storage Boom SILO NEEDED!  Result in a complete lock-down, including not be able to manage the overflowed device  It was the IPS, so no traffic allowed to anything

  31. 31

  32. “ We are under 32 attack – enforce the on-demand Scrubbing Service ”

  33. Learning mode – did you do it? 33  All is learned  Attack considered legitimate traffic

  34. 34

  35. “ So what CDN is 35 not dynamic? Let ’ s enable it ”

  36. NOT IN CACHE? ASK THE ORIGIN! 36

  37. 37

  38. 38

  39. How to find an ‘ invisible ’ origin? 39  Find other known subdomain -> translate to IP -> scan the /24 or /16 -> good chance it ’ s there.  AND … .. WHOIS never forgets  http://viewdns.info FTW!

  40. 40

  41. “ Block ‘ em!, now 41 them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them. “

  42. 42 Total IPs in FR: ~82 M

  43. 43 About 1,200 class B ranges

  44. Now think of a monkey 44 blocking every incoming alert. 10 MINUTES TO SELF INFLECTED DDOS

  45. Collected misconceptions 46  There is no magic pill or best cocktail mix of technologies/appliances/services, never was  DDoS is a subset of DoS, not the other way around  You can have all the toys and money in the world – you have to be prepared and have trained people in mitigation because of those reasons  If you won ’ t do that – you can be evaluated for this presentation in the future

  46. 47 Questions?

  47. 48 Thank you! Moshe Zioni zimoshe@gmail.com, @dalmoz_ corp:moshez@comsecglobal.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend