2.4 Denial of Service

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Denial-Of-Service (DoS):

Occurs when an attacker intentionally forces a service to fail, making it unavailable. Typically involves overwhelming the service with excessive requests or exploiting a known vulnerability or design flaw in the system.

  • Keep your systems patched

  • Organizations may create a denial of service against competitors as a form of competitive sabotage

  • Is used as a distraction, allowing attackers to exploit other vulnerabilities elsewhere in the organization while the focus is on mitigating the service disruption.

  • Doesn’t have to be complicated—simply turning off the power to a critical system can be enough to cause a significant disruption.

2
New cards

A “Friendly” DoS

Occurs when denial of service happens unintentionally, often due to a simple mistake or misconfiguration

  • If you connect two switches to each other and then connect them back to each other again, it can create a Layer 2 loop. Without Spanning Tree Protocol (STP) to prevent such loops, the network can become flooded with traffic, leading to a DoS situation

  • A Bandwidth DoS occurs when limited bandwidth is consumed by a single task.

  • For example, downloading a large file, like a Linux distribution, over a small DSL line could consume all available bandwidth, leaving none for other essential production applications, effectively causing a denial of service for those services.

3
New cards

Distributed Denial of Service (DDoS):

Involves launching a coordinated attack using an army of computers to overwhelm and bring down a target service.

  • Attackers typically control these computers through botnets—networks of infected devices that have been compromised with malware.

  • The attacker doesn't need to sit at each individual device. Instead, they command the botnet to launch an attack against a specific web server, all with a single command.

  • For example, the Zeus botnet had control over more than 3.6 million computers at its peak.

  • Considered an asymmetric threat, where the attacker, with relatively few resources, can easily disrupt organizations with far more systems and much greater bandwidth.

4
New cards

DDoS Reflection & Amplification

Attackers exploit internet services to create highly efficient attacks by sending small amounts of data that get amplified into much larger volumes, overwhelming the target system.

  • Takes advantage of protocols that require little or no authentication or checks, making them vulnerable to abuse.

  • When an attacker sends a small request to a server, they can receive back a much larger response than they originally requested. By using this amplification effect, the attacker can send small requests but cause significant traffic to be directed at the victim.

  • Common protocols used for reflection and amplification attacks include:

  • NTP

  • DNS

  • ICMP

5
New cards

Turning Up the Volume

  • The attacker sends a small amount of data, like a DNS query, which might be only about 15 characters.

  • The response from the DNS server can be much larger—about 1,300 characters in this case; increases the data volume by roughly 86 times

6
New cards

Open DNS Resolvers

  • A DNS server that is configured to resolve recursive DNS lookups for anyone on the internet, regardless of the source of the request

  • The attacker spoofs their IP address to redirect the amplified traffic to the victim's system, rather than to the attacker’s own system.

7
New cards

DNS Amplification DDoS:

  • Begins with the botnet command and control sending instructions to the botnet

  • The botnet devices are instructed to send queries to open DNS resolvers, with the IP address of the target web server being spoofed in the request.

  • The botnet devices send these queries to the open DNS resolvers.

  • The DNS resolvers, in turn, send their amplified responses to the spoofed web server IP address, overwhelming it with excessive traffic