SlideShare a Scribd company logo
DDoS Mitigation
collection
TL;DR: LEARN HOW TO DO (EFFICIENT) DDOS AND
(EASILY) BYPASS MITIGATION TACTICS
1
Agenda
 Intro to D/DoS
 Methodology of work
 DDoS tactics in-the-wild and how to improve
 10 ‘from-the-books’ strategies & how to
leverage your attack to fit them
 Q&A
2
~$ whoami
 Hi! Moshe Zioni, I do security stuff
 3 years of designing & providing a full-blown on-demand DDoS
attack service.
 Mainly exp. in Ethical Hacking & Penetration Testing
 1st time speaker @ CCC, grateful to have this honor.
 .///. END OF SHAMELESS PROMOTION SLIDE .///.
3
DDoS for Everyone! 4
Method 5
Run-of-the-Mill DDoS attacks in-the-wild
Rely heavily on bandwidth consumption
53% of attacks are < 2Gbps (SANS)
Reflection combined with Amplification relies on
3rd party domains (DNS, NTP etc.)
Most attacks does not require brains
6
Strike Harder! (!=Larger botnet)
There is more to a web site then a front-end (!!)
Overload the backend by making the system
work for you
Keep it stealthy, they might be using the
‘magic of sniffing’
Think of amplification in a general way
7
Generalized Amplification - “4 Pillars”
Amplification factors
Network – The usual suspect
CPU – Very limited on some mediators
and web application servers,
Memory – Volatile, everything uses it,
multi-step operations is prime target.
Storage – Can be filled up or
exhausting I/O buffer
8
DDoS mitigation EPIC FAIL collection - 32C3
DDoS mitigation EPIC FAIL collection - 32C3
W
Ready?
Set.
12
FACEPALM
13
14
“Limit the rate
of incoming
packets”
15
 The customer has been hit by a DDoS
attack that consumed ALL BANDWIDTH
 To rectify the situation the ISP suggested
limiting incoming packet rate to ensure
availability
 And so he did… believing that now he
upped the game significantly for us
16
Reflection to the rescue!
Consumption by reflection
Send in 1Kb
Consume
according to
file-length
17
DDoS mitigation EPIC FAIL collection - 32C3
19
“It’s OK now,
monitoring shows
everything is
back to normal”
20
 MegaCommonPractive now went on to
buy a Anti-DDoS solution
 A known Anti-DDoS cloud-based
protection solution approached the client
and offered a very solid looking solution
including 24/7 third party monitoring
21
DID YOU
ACTUALLY TRY
TO ACCESS
THE WEB SITE!!!!
22
23
24
“Backend servers
are not important
to protect
against DDoS”
25
Mapping the backend for DDoS
 Databases are very susceptible to DDoS attacks and
provide good grounds for intra-amplification
 How can we find DBs?
You can always guess, pentersters do that
all the time…
Takes more time == more elaborate
operation, may involve BE !!!
PROFIT!!!
26
27
28
29
Really??!?! ALL OF THE DOMAINS?!?
What is the strategy of
mitigation? Do you understand
it?
“Doesn’t matter, let’s do it!”
30
So, remember the booklet that you
didn’t read?
 Interesting strategy – the system is devising some
unknown algorithm to detect probable attacks.
 Defense mechanism is ‘draining’ out all traffic
first and do some magic.
 Mitigation is kicked in 20 seconds after detection
(supposedly to allow of building a model,
dunno)
31
32
33
“We don’t trust
the vendor, we
don’t give them
certificates”
34
Talk to me in layer 7…
Defense have chosen not to
monitor layer 7 – HTTPS attacks..
SSL re/negotiation
Plus –transmitting via HTTPS
GET/POST/… the vendor product
can’t learn and analyze traffic
35
36
37
“We need Big
Data, collect all
the logs”
38
Logs need to be handled
Storage Boom
Result in a complete lock-down,
including not be able to manage the
overflowed device
It was the IPS, so no traffic allowed to go
anywhere, no traffic in/out the system
SILO NEEDED!
39
40
41
“We are under
attack – enforce
the on-demand
Scrubbing Service”
42
Learning mode – did you do it?
All is learned
Attack considered legitimate traffic
RTFM
And… Vendor response was epic by
itself
43
44
45
“So what CDN is
not dynamic?
Let’s enable it”
46
NOT IN CACHE? ASK THE ORIGIN! 47
48
49
50
51
How to find an ‘invisible’ origin?
Find other known subdomain ->
translate to IP -> scan the /24 or /16 ->
good chance it’s there.
AND….. WHOIS never forgets
http://viewdns.info FTW!
52
53
54
“Block ‘em!, now
them, now them, now them, now
them, now them, now them, now
them, now them, now them, now
them, now them, now them, now
them, now them, now them. “
55
Total IPs (DE):
~116 M
56
* http://www.nirsoft.net/countryip/de.html
Roughly -1,800
class B ranges
57
We spoofed IPs from
those classes and deliver
a very detectable TCP
SYN flood attack from
each source
58
Now think of a monkey
blocking every incoming
alert.
15 MINUTES TO SELF
INFLICTED DDOS
59
60
Collected misconceptions
 There is no magic pill or best cocktail mix of
technologies/appliances/services, never was
– prepare a plan, not just a mitigation.
 You can have all the toys and money in the
world – best mitigation – don’t do drugs
 TEST your infrastructure regularly.
 If you won’t do that – you can be evaluated
for this presentation in the future
61
Questions?
62
Thank you!
Moshe Zioni
zimoshe@gmail.com, @dalmoz_
63

More Related Content

PDF
How to launch and defend against a DDoS
PDF
DNS DDoS Attack and Risk
PPT
DDoS Attacks and Countermeasures
PPTX
Anatomy of DDoS - Builderscon Tokyo 2017
PPTX
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
PPTX
The Anatomy of DDoS Attacks
PPTX
DDoS 101: Attack Types and Mitigation
PPTX
Botconf ppt
How to launch and defend against a DDoS
DNS DDoS Attack and Risk
DDoS Attacks and Countermeasures
Anatomy of DDoS - Builderscon Tokyo 2017
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
The Anatomy of DDoS Attacks
DDoS 101: Attack Types and Mitigation
Botconf ppt

What's hot (20)

PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PDF
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
PPTX
DrupalCon Vienna 2017 - Anatomy of DDoS
PPTX
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
PPTX
BADCamp 2017 - Anatomy of DDoS
PDF
Ddos and mitigation methods.pptx
PPTX
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
PDF
KubeConEU - NATS Deep Dive
PDF
SF Python Meetup - Introduction to NATS Messaging with Python3
PDF
NATS: Simple, Secure and Scalable Messaging For the Cloud Native Era
PPTX
The 3 Models in the NGINX Microservices Reference Architecture
PPT
Dos threats and countermeasures
PDF
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
PPTX
What is DDoS ?
PDF
NATS + Docker meetup talk Oct - 2016
PPTX
DDoS Attack and Mitigation
PDF
Protect Websites against DDoS attacks with Reblaze
PDF
GoSF: Decoupling Services from IP networks with NATS
PDF
@dtmsecurity Mitre ATT&CKcon - Playing Devil's Advocate to Security Initiativ...
PDF
Csp and http headers
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
Ricardo de Oliveria Schmidt - DDoS Attacks on the Root DNS
DrupalCon Vienna 2017 - Anatomy of DDoS
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
BADCamp 2017 - Anatomy of DDoS
Ddos and mitigation methods.pptx
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA (Updated)
KubeConEU - NATS Deep Dive
SF Python Meetup - Introduction to NATS Messaging with Python3
NATS: Simple, Secure and Scalable Messaging For the Cloud Native Era
The 3 Models in the NGINX Microservices Reference Architecture
Dos threats and countermeasures
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
What is DDoS ?
NATS + Docker meetup talk Oct - 2016
DDoS Attack and Mitigation
Protect Websites against DDoS attacks with Reblaze
GoSF: Decoupling Services from IP networks with NATS
@dtmsecurity Mitre ATT&CKcon - Playing Devil's Advocate to Security Initiativ...
Csp and http headers
Ad

Viewers also liked (6)

PDF
Top 10 DDoS Trends for 2013 Infographic
PDF
DDoS Mitigation Tools and Techniques
PPTX
Seniors Housing
PDF
Nanog66 vicente de luca fast netmon
PPTX
Ddos and mitigation methods.pptx (1)
PPT
10 DDoS Mitigation Techniques
Top 10 DDoS Trends for 2013 Infographic
DDoS Mitigation Tools and Techniques
Seniors Housing
Nanog66 vicente de luca fast netmon
Ddos and mitigation methods.pptx (1)
10 DDoS Mitigation Techniques
Ad

Similar to DDoS mitigation EPIC FAIL collection - 32C3 (20)

PDF
44CON London 2015 - DDoS mitigation EPIC FAIL collection
PDF
A10 issa d do s 5-2014
PDF
DDoS mitigation in the real world
PDF
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
PDF
KHNOG 3: DDoS Attack Prevention
PDF
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
PDF
DDoS Mitigation Techniques for Your Enterprise IT Network
PPTX
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
ODP
DDoS - unstoppable menace
ODP
DDoS - unstoppable menace
PPT
Protecting your business from ddos attacks
PPTX
Study of System Attacks- DoS.pptx
PDF
ECE560 Denial of Service Attacks Fall2020.pdf
PPT
Denial of services : limiting the threat
PDF
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
PDF
9 Steps For Fighting Against a DDos Attack in real-time
PDF
Distributed Denial of Service Attack - Detection And Mitigation
PPTX
DDOS ATTACKS
PDF
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
PPTX
ARBOR PRESENTATION - SHARING SESSION - 1.pptx
44CON London 2015 - DDoS mitigation EPIC FAIL collection
A10 issa d do s 5-2014
DDoS mitigation in the real world
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...
KHNOG 3: DDoS Attack Prevention
DDoS Mitigation Guide |DDoS Protection Cyber Security | MazeBolt
DDoS Mitigation Techniques for Your Enterprise IT Network
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
DDoS - unstoppable menace
DDoS - unstoppable menace
Protecting your business from ddos attacks
Study of System Attacks- DoS.pptx
ECE560 Denial of Service Attacks Fall2020.pdf
Denial of services : limiting the threat
EuroBSDCon 2013 - Mitigating DDoS Attacks at Layer 7
9 Steps For Fighting Against a DDos Attack in real-time
Distributed Denial of Service Attack - Detection And Mitigation
DDOS ATTACKS
DDoS Mitigation Training | DDoS Mitigation Guide | Learn DDoS Mitigation Conc...
ARBOR PRESENTATION - SHARING SESSION - 1.pptx

More from Moshe Zioni (6)

PPTX
Pipiot - the double-architecture shellcode constructor
PPTX
MQTT - for fun and profit - explore & exploit - OWASP IL 2017 v1.2
PDF
MQTT - IoT - explore & exploit - BSidesTLV 2017 (June 2017)
PPTX
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
PDF
Abusing the Train Communication Network or What could have derailed the North...
PPTX
Lexical captcha beat down - Structured attack approach
Pipiot - the double-architecture shellcode constructor
MQTT - for fun and profit - explore & exploit - OWASP IL 2017 v1.2
MQTT - IoT - explore & exploit - BSidesTLV 2017 (June 2017)
InfoSecurity Europe 2017 - On The Hunt for Advanced Attacks? C&C Channels are...
Abusing the Train Communication Network or What could have derailed the North...
Lexical captcha beat down - Structured attack approach

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Cloud computing and distributed systems.
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Cloud computing and distributed systems.
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

DDoS mitigation EPIC FAIL collection - 32C3

  • 1. DDoS Mitigation collection TL;DR: LEARN HOW TO DO (EFFICIENT) DDOS AND (EASILY) BYPASS MITIGATION TACTICS 1
  • 2. Agenda  Intro to D/DoS  Methodology of work  DDoS tactics in-the-wild and how to improve  10 ‘from-the-books’ strategies & how to leverage your attack to fit them  Q&A 2
  • 3. ~$ whoami  Hi! Moshe Zioni, I do security stuff  3 years of designing & providing a full-blown on-demand DDoS attack service.  Mainly exp. in Ethical Hacking & Penetration Testing  1st time speaker @ CCC, grateful to have this honor.  .///. END OF SHAMELESS PROMOTION SLIDE .///. 3
  • 6. Run-of-the-Mill DDoS attacks in-the-wild Rely heavily on bandwidth consumption 53% of attacks are < 2Gbps (SANS) Reflection combined with Amplification relies on 3rd party domains (DNS, NTP etc.) Most attacks does not require brains 6
  • 7. Strike Harder! (!=Larger botnet) There is more to a web site then a front-end (!!) Overload the backend by making the system work for you Keep it stealthy, they might be using the ‘magic of sniffing’ Think of amplification in a general way 7
  • 8. Generalized Amplification - “4 Pillars” Amplification factors Network – The usual suspect CPU – Very limited on some mediators and web application servers, Memory – Volatile, everything uses it, multi-step operations is prime target. Storage – Can be filled up or exhausting I/O buffer 8
  • 11. W
  • 14. 14
  • 15. “Limit the rate of incoming packets” 15
  • 16.  The customer has been hit by a DDoS attack that consumed ALL BANDWIDTH  To rectify the situation the ISP suggested limiting incoming packet rate to ensure availability  And so he did… believing that now he upped the game significantly for us 16
  • 17. Reflection to the rescue! Consumption by reflection Send in 1Kb Consume according to file-length 17
  • 19. 19
  • 20. “It’s OK now, monitoring shows everything is back to normal” 20
  • 21.  MegaCommonPractive now went on to buy a Anti-DDoS solution  A known Anti-DDoS cloud-based protection solution approached the client and offered a very solid looking solution including 24/7 third party monitoring 21
  • 22. DID YOU ACTUALLY TRY TO ACCESS THE WEB SITE!!!! 22
  • 23. 23
  • 24. 24
  • 25. “Backend servers are not important to protect against DDoS” 25
  • 26. Mapping the backend for DDoS  Databases are very susceptible to DDoS attacks and provide good grounds for intra-amplification  How can we find DBs? You can always guess, pentersters do that all the time… Takes more time == more elaborate operation, may involve BE !!! PROFIT!!! 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. Really??!?! ALL OF THE DOMAINS?!? What is the strategy of mitigation? Do you understand it? “Doesn’t matter, let’s do it!” 30
  • 31. So, remember the booklet that you didn’t read?  Interesting strategy – the system is devising some unknown algorithm to detect probable attacks.  Defense mechanism is ‘draining’ out all traffic first and do some magic.  Mitigation is kicked in 20 seconds after detection (supposedly to allow of building a model, dunno) 31
  • 32. 32
  • 33. 33
  • 34. “We don’t trust the vendor, we don’t give them certificates” 34
  • 35. Talk to me in layer 7… Defense have chosen not to monitor layer 7 – HTTPS attacks.. SSL re/negotiation Plus –transmitting via HTTPS GET/POST/… the vendor product can’t learn and analyze traffic 35
  • 36. 36
  • 37. 37
  • 38. “We need Big Data, collect all the logs” 38
  • 39. Logs need to be handled Storage Boom Result in a complete lock-down, including not be able to manage the overflowed device It was the IPS, so no traffic allowed to go anywhere, no traffic in/out the system SILO NEEDED! 39
  • 40. 40
  • 41. 41
  • 42. “We are under attack – enforce the on-demand Scrubbing Service” 42
  • 43. Learning mode – did you do it? All is learned Attack considered legitimate traffic RTFM And… Vendor response was epic by itself 43
  • 44. 44
  • 45. 45
  • 46. “So what CDN is not dynamic? Let’s enable it” 46
  • 47. NOT IN CACHE? ASK THE ORIGIN! 47
  • 48. 48
  • 49. 49
  • 50. 50
  • 51. 51
  • 52. How to find an ‘invisible’ origin? Find other known subdomain -> translate to IP -> scan the /24 or /16 -> good chance it’s there. AND….. WHOIS never forgets http://viewdns.info FTW! 52
  • 53. 53
  • 54. 54
  • 55. “Block ‘em!, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them, now them. “ 55
  • 56. Total IPs (DE): ~116 M 56 * http://www.nirsoft.net/countryip/de.html
  • 58. We spoofed IPs from those classes and deliver a very detectable TCP SYN flood attack from each source 58
  • 59. Now think of a monkey blocking every incoming alert. 15 MINUTES TO SELF INFLICTED DDOS 59
  • 60. 60
  • 61. Collected misconceptions  There is no magic pill or best cocktail mix of technologies/appliances/services, never was – prepare a plan, not just a mitigation.  You can have all the toys and money in the world – best mitigation – don’t do drugs  TEST your infrastructure regularly.  If you won’t do that – you can be evaluated for this presentation in the future 61