Layer 7 DOS attack
 By :Oussama Elhamer Abdelkhalek.
Summary
•   The History of Dos attack .
•   Layer 4 Ddos : Overview.
•   Layer 7 Dos One attacker Brings Down one site .
•   Link-Local Dos : RA ip6 attack.
The Dos History
The Dos History
Layer 4 Ddos Attack :
• Primitive DDOS attack controlled via
  IRC.
• Sends Thousands of packets per second
  from the attacker directly to the target.
• Needs Thousands of participants to
  bring down a large site.
• Take down master card for more than a
  day (3.000 to 30.000)
• Nothing More Than Pressing F5. (The
  Low Orbit lon Cannon Do That For u
  /:p)
Layer 7 DOS
• Operates at the application protocol level
   (OSI Layer 7).
• Can Be routed through proxies .
• More Dangerous.
• Low Bandwidth .
• Can Be Very Difficult To Distinguish From normal trafic.
  Eg. HTTP(S), SMTP, FTP and etc.
Some Example Of Layer 7 Dos
         Attacks

We will focus on The weaknesses of The Http
Protocol .
HTTP GET
HTTP GET attack :
-Dont Send A Complete Request To The WebServer (Incomplete
Headers ) Send SomeThing That Will hold The Web Server
Continues To Send Headers at Regular intervals to keep the
Sockets active !
-So If You Open One Thousand Connection On A server That can Only
Handle Five Hundred It Will be Rejecting Requests .
Example Message syntax :
GET /indexPage.html HTTP/1.1 CRLF <- Request Line
Host : www.host.com:8080 CRLF
Content-Length :25 CRLF
CRLF
<Optional Messaga Body >


- The Server Stop Reading When See Two CRLF and Start generating
the response and sending feed back .
• Example
• The Server Will Drop The Connection If There Are No Data In 60 Seconds !


•         Get/http/1.1 rn
•         Host :Server rn
•         X-skdvbk :sdjvjrn

•                                ----59 Sec later
•          X-skdvbk :sdjvjrn
•                                ----59 Sec later
•         X-skdvbk :sdjvjrn
•                                ----59 Sec later
•         X-skdvbk :sdjvjrn
•                                ----59 Sec later
Client                                              Server

• This Attack Don’t Works With IIS because it Use a time out .
• No Realible Configurartion Universal To Protect your Web Server
• But there Are some Recommandation THAT minimize the damage
SlowLoris

•   Send Incomplete GET requests
•   And Freezes Apache With One Packet Per Second .
•   keeps sessions at halt
•   using neverending GET transmissions
HTTP post
• Similar To http gET.
• The Connections Whith The Server Stay Opened.
• instead of prolongating The Header Section Of The http
  Request It Prolongate The Message Body Section
R-U-Dead-Yet :
• Incomplete HTTP POSTs
• implements the generic HTTP DoS attack via long form field
  submissions.
• Stops IIS, But Requires Thousands Of packets per second.
More Variation

• Keep-Alive Dos: A variation of The incomplete http get
  requests But Less Powerful .
• XerXes A Tool Developped By Th3j35t3r
•
• -Can be Imported To a 3G cell phone
• -Can be run throught VPN.
Link-Local Dos
• IPv6 Router Advertisments

• In ip v4 :
• The Client Request An Ip
• The Router Provides One
• In ipv6
• The Router announces its presence
• Every client on the Lan Creates an adress and joins the
  network
•   The problem That you can Send A lot Of Router advertisement
•   The Lan Machines Will Join All Those Networks
•   And Windows Is inefficient in doing That
•   You can take Down all The Lan .
Demo :
• Slowloris .
• R-u-dead yet .
• RA ip6 attack .
Thanks

More Related Content

PDF
CNIT 40: 6: DNSSEC and beyond
PPTX
Anatomy of DDoS - Builderscon Tokyo 2017
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
Zhiyun Qian-what leaves attacker hijacking USA Today site
PDF
Breaking SSL using time synchronisation attacks
PPTX
Automated Deployment Using Jenkins Across Clusters
PDF
Huiming Liu-'resident evil' of smart phones--wombie attack
PDF
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 6: DNSSEC and beyond
Anatomy of DDoS - Builderscon Tokyo 2017
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
Zhiyun Qian-what leaves attacker hijacking USA Today site
Breaking SSL using time synchronisation attacks
Automated Deployment Using Jenkins Across Clusters
Huiming Liu-'resident evil' of smart phones--wombie attack
CNIT 40: 1: The Importance of DNS Security

What's hot (20)

PPTX
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
PDF
CNIT 40: 3: DNS vulnerabilities
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
CNIT 40: 4: Monitoring and detecting security breaches
KEY
Netscreen Policy Based Routing
PDF
Modern Reconnaissance Phase on APT - protection layer
PDF
SRX Automation at Groupon
PDF
Heartache and Heartbleed - 31c3
PDF
Nick Stephens-how does someone unlock your phone with nose
DOCX
Type of DDoS attacks with hping3 example
PDF
Tuning the Kernel for Varnish Cache
PDF
Securing Sharded Networks with Swarm
PDF
Dokku - your own heroku
PDF
Dokku your own heroku 21
KEY
DNS-SD
PDF
Varnish Cache 4.0 / Redpill Linpro breakfast in Oslo
PPTX
Dock ir incident response in a containerized, immutable, continually deploy...
PDF
CNIT 40: 2: DNS Protocol and Architecture
PDF
XFLTReat: a new dimension in tunnelling
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 4: Monitoring and detecting security breaches
Netscreen Policy Based Routing
Modern Reconnaissance Phase on APT - protection layer
SRX Automation at Groupon
Heartache and Heartbleed - 31c3
Nick Stephens-how does someone unlock your phone with nose
Type of DDoS attacks with hping3 example
Tuning the Kernel for Varnish Cache
Securing Sharded Networks with Swarm
Dokku - your own heroku
Dokku your own heroku 21
DNS-SD
Varnish Cache 4.0 / Redpill Linpro breakfast in Oslo
Dock ir incident response in a containerized, immutable, continually deploy...
CNIT 40: 2: DNS Protocol and Architecture
XFLTReat: a new dimension in tunnelling
Ad

Similar to BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer (20)

PPS
Aditya - Hacking Client Side Insecurities - ClubHack2008
PDF
Layer one 2011-sam-bowne-layer-7-dos
PDF
Layer one 2011-sam-bowne-layer-7-dos
PDF
Drilling Down Into DNS DDoS
PPT
SPDY Talk
PDF
Enter Gossipsub, A scalable, extensible & hardened P2P PubSub Router protocol
PPTX
Session for InfoSecGirls - New age threat management vol 1
PDF
DDoS Threat Landscape - Ron Winward CHINOG16
PDF
RedisConf18 - Redis at LINE - 25 Billion Messages Per Day
PDF
Multi-Layer DDoS Mitigation Strategies
PDF
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
PDF
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
KEY
Apache Wizardry - Ohio Linux 2011
PDF
Http requesting smuggling
PDF
Http requesting smuggling
PPT
Dos threats and countermeasures
PPTX
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
PDF
Troubleshooting Kafka's socket server: from incident to resolution
PPT
Bh usa-01-kaminsky
PDF
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
Aditya - Hacking Client Side Insecurities - ClubHack2008
Layer one 2011-sam-bowne-layer-7-dos
Layer one 2011-sam-bowne-layer-7-dos
Drilling Down Into DNS DDoS
SPDY Talk
Enter Gossipsub, A scalable, extensible & hardened P2P PubSub Router protocol
Session for InfoSecGirls - New age threat management vol 1
DDoS Threat Landscape - Ron Winward CHINOG16
RedisConf18 - Redis at LINE - 25 Billion Messages Per Day
Multi-Layer DDoS Mitigation Strategies
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
Apache Wizardry - Ohio Linux 2011
Http requesting smuggling
Http requesting smuggling
Dos threats and countermeasures
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Troubleshooting Kafka's socket server: from incident to resolution
Bh usa-01-kaminsky
Altitude San Francisco 2018: HTTP/2 Tales: Discovery and Woe
Ad

More from Shellmates (15)

PPTX
Cryptography basics
PPTX
HTML basics
PDF
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
PDF
Atelier Python 2eme partie par Achraf Kacimi El Hassani
PPTX
JavaScript 1.0 by Zakaria Smahi
PDF
Introduction à Python - Achraf Kacimi El Hassani
PPTX
BSides Algiers - Stuxnet - Sofiane Talmat
PDF
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
PPTX
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
ODP
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
PDF
BSides Algiers - Normes ISO 2700x - Badis Remli
PPTX
BSides Algiers - Metasploit framework - Oussama Elhamer
PDF
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
PDF
BSides Algiers - Certification Electronique - Lilia Ounini
PPTX
BSides algiers - Malware History - Sofiane Talmat
Cryptography basics
HTML basics
Malware Analysis par Mohamed Ali FATHI - BSides Algiers 2k15
Atelier Python 2eme partie par Achraf Kacimi El Hassani
JavaScript 1.0 by Zakaria Smahi
Introduction à Python - Achraf Kacimi El Hassani
BSides Algiers - Stuxnet - Sofiane Talmat
BSides Algiers - Linux Kernel and Recent Security Protections - Djallal Harouni
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
BSides Algiers - Nmap Scripting Engine - Hani Benhabiles
BSides Algiers - Normes ISO 2700x - Badis Remli
BSides Algiers - Metasploit framework - Oussama Elhamer
BSides Algiers - PHP Static Code Analysis - Abdeldjalil Belakhdar
BSides Algiers - Certification Electronique - Lilia Ounini
BSides algiers - Malware History - Sofiane Talmat

Recently uploaded (20)

PPTX
Chapter 5: Probability Theory and Statistics
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPT
What is a Computer? Input Devices /output devices
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Microsoft Excel 365/2024 Beginner's training
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecture types and enterprise applications.pdf
PPTX
Modernising the Digital Integration Hub
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
Chapter 5: Probability Theory and Statistics
Taming the Chaos: How to Turn Unstructured Data into Decisions
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
1 - Historical Antecedents, Social Consideration.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
sbt 2.0: go big (Scala Days 2025 edition)
What is a Computer? Input Devices /output devices
Zenith AI: Advanced Artificial Intelligence
sustainability-14-14877-v2.pddhzftheheeeee
2018-HIPAA-Renewal-Training for executives
Microsoft Excel 365/2024 Beginner's training
Benefits of Physical activity for teenagers.pptx
UiPath Agentic Automation session 1: RPA to Agents
A comparative study of natural language inference in Swahili using monolingua...
Architecture types and enterprise applications.pdf
Modernising the Digital Integration Hub
Hindi spoken digit analysis for native and non-native speakers
A review of recent deep learning applications in wood surface defect identifi...
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Custom Battery Pack Design Considerations for Performance and Safety

BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer

  • 1. Layer 7 DOS attack By :Oussama Elhamer Abdelkhalek.
  • 2. Summary • The History of Dos attack . • Layer 4 Ddos : Overview. • Layer 7 Dos One attacker Brings Down one site . • Link-Local Dos : RA ip6 attack.
  • 5. Layer 4 Ddos Attack : • Primitive DDOS attack controlled via IRC. • Sends Thousands of packets per second from the attacker directly to the target. • Needs Thousands of participants to bring down a large site. • Take down master card for more than a day (3.000 to 30.000) • Nothing More Than Pressing F5. (The Low Orbit lon Cannon Do That For u /:p)
  • 6. Layer 7 DOS • Operates at the application protocol level (OSI Layer 7). • Can Be routed through proxies . • More Dangerous. • Low Bandwidth . • Can Be Very Difficult To Distinguish From normal trafic. Eg. HTTP(S), SMTP, FTP and etc.
  • 7. Some Example Of Layer 7 Dos Attacks We will focus on The weaknesses of The Http Protocol .
  • 9. HTTP GET attack : -Dont Send A Complete Request To The WebServer (Incomplete Headers ) Send SomeThing That Will hold The Web Server Continues To Send Headers at Regular intervals to keep the Sockets active ! -So If You Open One Thousand Connection On A server That can Only Handle Five Hundred It Will be Rejecting Requests . Example Message syntax : GET /indexPage.html HTTP/1.1 CRLF <- Request Line Host : www.host.com:8080 CRLF Content-Length :25 CRLF CRLF <Optional Messaga Body > - The Server Stop Reading When See Two CRLF and Start generating the response and sending feed back .
  • 10. • Example • The Server Will Drop The Connection If There Are No Data In 60 Seconds ! • Get/http/1.1 rn • Host :Server rn • X-skdvbk :sdjvjrn • ----59 Sec later • X-skdvbk :sdjvjrn • ----59 Sec later • X-skdvbk :sdjvjrn • ----59 Sec later • X-skdvbk :sdjvjrn • ----59 Sec later Client Server • This Attack Don’t Works With IIS because it Use a time out . • No Realible Configurartion Universal To Protect your Web Server • But there Are some Recommandation THAT minimize the damage
  • 11. SlowLoris • Send Incomplete GET requests • And Freezes Apache With One Packet Per Second . • keeps sessions at halt • using neverending GET transmissions
  • 12. HTTP post • Similar To http gET. • The Connections Whith The Server Stay Opened. • instead of prolongating The Header Section Of The http Request It Prolongate The Message Body Section
  • 13. R-U-Dead-Yet : • Incomplete HTTP POSTs • implements the generic HTTP DoS attack via long form field submissions. • Stops IIS, But Requires Thousands Of packets per second.
  • 14. More Variation • Keep-Alive Dos: A variation of The incomplete http get requests But Less Powerful . • XerXes A Tool Developped By Th3j35t3r • • -Can be Imported To a 3G cell phone • -Can be run throught VPN.
  • 15. Link-Local Dos • IPv6 Router Advertisments • In ip v4 : • The Client Request An Ip • The Router Provides One • In ipv6 • The Router announces its presence • Every client on the Lan Creates an adress and joins the network
  • 16. The problem That you can Send A lot Of Router advertisement • The Lan Machines Will Join All Those Networks • And Windows Is inefficient in doing That • You can take Down all The Lan .
  • 17. Demo : • Slowloris . • R-u-dead yet . • RA ip6 attack .