SlideShare a Scribd company logo
DDoS Attacks
into the Matrix
Jair Santanna
jairsantanna.com
j.j.santanna@utwente.nl
09/09/2015
First of all…
2
My Goal…
3
Requirement…
What do you think is a Sniffer?
4
WIRESHARK
5
https://www.wireshark.org/download.html
*sudo apt-get install tcpdump
*sudo port install tcpdump
6
"Promiscuous Mode"7
Steps:
1) Start sniffing
2) Open a website
3) Discover the IP
address using a
CMD or a terminal
(host “website”)
4) Create a filter
on Wireshark
(ip.addr == “website_IP")
Example…
8
Denial of Service
DoS
9
10
Distributed Denial of Service
DDoS
11
12
13
Direct Attacks
14
Indirect Attacks
15
Reflected Attacks
16
Request
ResponseServer Client
J
Amplification
=A x
Client-Server
17
ResponseServer Client
J
Request
Spoofed
Reflection and Amplification
Client
“J"
18
• Consider that your network can send (upload) spoofed requests at 10Mbps.
• Consider Amplification factor AMP = ans/req
For 1 Spoofer and 1 misused Server
• Attack = 10Mbps *(ans/req)
So Attack = 10Mbps*AMPserver
For 1 Spoofer and 2 misused Servers
• Attack = 5Mbps *AMPserver1+ 5Mbps *AMPserver2
if both servers have the same Amplification
Then, Attack = (5Mbps+5Mbps)*AMP
So, Attack = 10Mbps*AMP
GENERALISING…
For 1 Spoofer and N misused Server
• Attack = (10Mbps/N)*AMPserver1+ … +(10Mbps/N) *AMPservern
if ALL servers have the same Amplification
Then, Attack = (10Mbps/N+…10Mbps/N)*AMP
So, Attack = (N*10Mbps/N)*AMP = 10Mbps*AMP
CONCLUSION:
In theory, doesn’t matter the number of Amplifiers (if we consider the same Amplification factor). The bottleneck of this
type of attack is the Spoofer capacity. Note that, in practice, the number of packets per second (pps) needs to be
considered instead of the link size. Finally, note that Servers (able to amplify requests) have a limit of pps making the
need (from attackers) for several server to amplify requests;19
Generic way to calculate how
much can be generated:
Attack = Spoofer_capacity*AMP
How much traffic can be generated using my
home connection and 100 BitTorrent servers?
[theoretically]
https://en.wikipedia.org/wiki/Denial-of-service_attack
http://www.speedtest.net/
20
4,14 Mbps * [4 ; 54,3]
[16,56 ; 224,80] Mbps
**Special thanks to Jelmer Graat21
Hacker
Who?
22
23
Anyone!
24
25
26
27
How to Find Booters?
28
29
284 Booter domain names
111 online Booters
30
What is the easy way to
measure their service?
31
14 Booters
Hired, Collected, and Analysed
UDP-based
32
# Booter URL
Offer
[Gbps]
1 boo ?
2 res 5
3 ano 5
4 des 25
5 fla ?
6 dej 10
7 reb Up to 3
8 gri 6
9 qua 1,5
10 oly Up to 3
11 ebo ?
12 vdo ?
13 resp 8
14 oni ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,3533
34
3 reasons!
35
res oni
36
3 1
oly vdo ebo
1
37
38
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).39
# Booter URL
Offer
[Gbps]
1 boo ?
2 res 5
3 ano 5
4 des 25
5 fla ?
6 dej 10
7 reb Up to 3
8 gri 6
9 qua 1,5
10 oly Up to 3
11 ebo ?
12 vdo ?
13 resp 8
14 oni ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
Request
ddostheinter.net
anonsc.com
anonsc.com
root-server.net
-
packetdevil.com
-
root-server.net
root-server.net
dig @8.8.8.8 -t ANY packetdevil.com
dig @8.8.8.8 -t ANY root-server.net
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
40
DNS-based attacks
root-server.net
anonsc.com
ddostheinter.net
packetdevil.com
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).41
CharGen-based attacks
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).42
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
# Booter URL
Offer
[Gbps]
1 boo ?
2 res 5
3 ano 5
4 des 25
5 fla ?
6 dej 10
7 reb Up to 3
8 gri 6
9 qua 1,5
10 oly Up to 3
11 ebo ?
12 vdo ?
13 resp 8
14 oni ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
Unique IPs
8281
7369
6075
4486
3779
2970
281
78
54
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
43
8280
http://booter.tw http://restricted-stresser.info
7369
http://anonymous-stresser.net
6075
http://destressbooter.com
4486
http://flashstresser.net
3779
http://dejabooter.com
2970
http://rebel-security.com
281
http://grimboot.com
78
http://quantumbooter.net
*54
98%
Santanna, J.J. et al. 2015. Booters - An Analysis of DDoS-as-a-Service Attacks. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).
44
# Booter URL
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
Unique IPs
8281
7369
6075
4486
3779
2970
281
78
54
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
29x
45
# Booter URL
Offer
[Gbps]
1 http://booter.tw ?
2 http://restricted-stresser.info 5
3 http://anonymous-stresser.net 5
4 http://destressbooter.com 25
5 http://flashstresser.net ?
6 http://dejabooter.com 10
7 http://rebel-security.com Up to 3
8 http://grimboot.com 6
9 http://quantumbooter.net 1,5
10 http://olympusstresser.org Up to 3
11 http://ebooter.5gbfree.com ?
12 http://vdoss.net ?
13 http://respawn.ca 8
14 http://onionstresser.com ?
Price [€]
10,90
1,95
3,12
3,89
3,89
3,89
3,00
3,90
8,00
4,90
free
3,11
3,90
3,90
€58,35
Unique IPs
8281
7369
6075
4486
3779
2970
281
78
54
Protocol
*DNS
*DNS
*DNS
*DNS
*Chargen
*DNS
*Chargen
*DNS
*DNS
9427x
46
47
Database Analyses
48
Example: http://pastebin.com/7CZBKXVL49
15 Databases
50
Trust??!!!
51
Timeline
Domain Registration
Domaintools
DNSDB
First attack
Passive DNS
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).52
User
Cu$tomer
Attacker
53
User
54
Cu$tomer
55
Attacker
56
User
Customer
Attacker
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).57
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).58
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).59
Santanna, J.J. et al. 2015. Inside Booters: An Analysis on Operational Databases. 14th IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015).60
Looking Inside the
Matrix[if time]
61
DOWNLOAD…
+
http://www.simpleweb.org/wiki/Traces#Booters_-_An_analysis_of_DDoS-as-a-Service_Attacks
62
DDoS Attacks
&&
Booters
[Guest Lecture]
Jair Santanna
jairsantanna.com
j.j.santanna@utwente.nl
09/09/201563

More Related Content

PPTX
Incident response: Advanced Network Forensics
PPTX
Incident Response: Tunnelling
PDF
Distributed Denial of Service Attack - Detection And Mitigation
PDF
FastNetMon - ENOG9 speech about DDoS mitigation
PPTX
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
PDF
#NSD15 - Attaques DDoS Internet et comment les arrêter
PDF
SMTP STS (Strict Transport Security) vs. SMTP with DANE
Incident response: Advanced Network Forensics
Incident Response: Tunnelling
Distributed Denial of Service Attack - Detection And Mitigation
FastNetMon - ENOG9 speech about DDoS mitigation
Passive Fingerprinting of HTTP/2 Clients by Ory Segal
#NSD15 - Attaques DDoS Internet et comment les arrêter
SMTP STS (Strict Transport Security) vs. SMTP with DANE

What's hot (20)

PPT
OSTU - Sake Blok on Packet Capturing with Tshark
PPTX
DeiC DDoS Prevention System - DDPS
PDF
Keeping your rack cool
PDF
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
PPTX
Detection index learning based on cyber threat intelligence and its applicati...
PPT
WiFi practical hacking "Show me the passwords!"
PDF
20150909_cybercrime_cybersecurity_minor
PDF
DNS как линия защиты/DNS as a Defense Vector
PDF
Firewall
PPT
PDF
DNSSEC signing Tutorial
PDF
Wi-Foo Ninjitsu Exploitation
PDF
Handy Networking Tools and How to Use Them
PDF
[Fs8600] nas session validation test_by_hoon_jo
PDF
DNS High-Availability Tools - Open-Source Load Balancing Solutions
PDF
[242] wifi를 이용한 실내 장소 인식하기
PPTX
Ddos and mitigation methods.pptx (1)
PDF
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
PDF
[MeetUp][2nd] 컭on턺
PDF
L3HA-VRRP-20141201
OSTU - Sake Blok on Packet Capturing with Tshark
DeiC DDoS Prevention System - DDPS
Keeping your rack cool
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
Detection index learning based on cyber threat intelligence and its applicati...
WiFi practical hacking "Show me the passwords!"
20150909_cybercrime_cybersecurity_minor
DNS как линия защиты/DNS as a Defense Vector
Firewall
DNSSEC signing Tutorial
Wi-Foo Ninjitsu Exploitation
Handy Networking Tools and How to Use Them
[Fs8600] nas session validation test_by_hoon_jo
DNS High-Availability Tools - Open-Source Load Balancing Solutions
[242] wifi를 이용한 실내 장소 인식하기
Ddos and mitigation methods.pptx (1)
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[MeetUp][2nd] 컭on턺
L3HA-VRRP-20141201
Ad

Similar to 20150909_network_security_lecture (20)

PDF
20140313_tu_delft
PDF
20170926 Inter-Actief Lunchtalk Jair Santanna
PDF
KHNOG 3: DDoS Attack Prevention
PDF
Hacking in shadows By - Raghav Bisht
PDF
DDoS attacks, Booters, and DDoSDB
PDF
CCNA 200-120 Exam Questions
PDF
26.1.7 lab snort and firewall rules
PDF
"Giving the bad guys no sleep"
PDF
How Networking works with Data Science
PDF
Hacking from the Inside
PDF
IoT - the Next Wave of DDoS Threat Landscape
PPTX
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
PDF
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
PDF
Atelier Technique CISCO ACSS 2018
PDF
Practical steps to mitigate DDoS attacks
PDF
R bernardino hand_in_assignment_week_1
PDF
Securing your web infrastructure
PDF
27.2.12 lab interpret http and dns data to isolate threat actor
PPTX
Disruptionware-TRustedCISO103020v0.7.pptx
PDF
Tutorial mikrotik step by step
20140313_tu_delft
20170926 Inter-Actief Lunchtalk Jair Santanna
KHNOG 3: DDoS Attack Prevention
Hacking in shadows By - Raghav Bisht
DDoS attacks, Booters, and DDoSDB
CCNA 200-120 Exam Questions
26.1.7 lab snort and firewall rules
"Giving the bad guys no sleep"
How Networking works with Data Science
Hacking from the Inside
IoT - the Next Wave of DDoS Threat Landscape
How to Introduce Telemetry Streaming (gNMI) in Your Network with SNMP with Te...
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Atelier Technique CISCO ACSS 2018
Practical steps to mitigate DDoS attacks
R bernardino hand_in_assignment_week_1
Securing your web infrastructure
27.2.12 lab interpret http and dns data to isolate threat actor
Disruptionware-TRustedCISO103020v0.7.pptx
Tutorial mikrotik step by step
Ad

More from University of Twente (12)

PDF
20170406 delft
PDF
Meeting Towards Collaboration for DDoS Attack Mitigation
PDF
DDoS attacks and Booters -- *my thesis summary
PDF
Booter Blacklist: Unveiling DDoS-for-hire Websites
PDF
Inter-actief presentation
PDF
Civil Disobedience, DDoS attacks, Booters, and Beyond!
PDF
20160816 amlight popbahia_rnp_ansp
PDF
20160613 TNC TERENA
PDF
20160416_de-cix
PDF
20160416_flamingo
PDF
20150311 bit module7_tbk_bit_lecture
PDF
20160316_tbk_bit_module7
20170406 delft
Meeting Towards Collaboration for DDoS Attack Mitigation
DDoS attacks and Booters -- *my thesis summary
Booter Blacklist: Unveiling DDoS-for-hire Websites
Inter-actief presentation
Civil Disobedience, DDoS attacks, Booters, and Beyond!
20160816 amlight popbahia_rnp_ansp
20160613 TNC TERENA
20160416_de-cix
20160416_flamingo
20150311 bit module7_tbk_bit_lecture
20160316_tbk_bit_module7

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Classroom Observation Tools for Teachers
PPTX
master seminar digital applications in india
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Computing-Curriculum for Schools in Ghana
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
01-Introduction-to-Information-Management.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Module 4: Burden of Disease Tutorial Slides S2 2025
Classroom Observation Tools for Teachers
master seminar digital applications in india
Orientation - ARALprogram of Deped to the Parents.pptx
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
Computing-Curriculum for Schools in Ghana
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Pharma ospi slides which help in ospi learning
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Final Presentation General Medicine 03-08-2024.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
Microbial diseases, their pathogenesis and prophylaxis
01-Introduction-to-Information-Management.pdf
A systematic review of self-coping strategies used by university students to ...

20150909_network_security_lecture