SlideShare a Scribd company logo
Layer 7 DoS Attacks
   and Defenses
     LayerOne, 2011
Bio
Summary

• The DoS Circus
• Layer 4 DDoS: Thousands of attackers
  bring down one site
• Layer 7 DoS: One attacker brings
  down one site
• Link-Local DoS: IPv6 RA Attack: One
  attacker brings down a whole network
The DoS Circus
   Characters
Wikileaks
• Published <1000 US Gov't
  diplomatic cables from
  a leak of 250,000
• Distributed an encrypted "Insurance" file by
  BitTorrent
  • Widely assumed to contain the complete,
    uncensored leaked data
  • Encrypted with AES-256--no one is ever getting in
    there without the key
  • Key to be released if Assange is jailed or killed,
    but he is in UK now resisting extradition to
    Sweden and the key has not been released
Anonymous
Operation Payback
• 4chan's Anonymous group
   • Attacked Scientology websites in 2008
   • Attacked the RIAA and other copyright
     defenders
   • Using the Low Orbit Ion Cannon with
     HiveMind (DDoS)
      • "Opt-in Botnet"
HB Gary Federal
• Aaron Barr
  • Developed a questionable
    way to track people down
    online
  • By correlating Twitter,
    Facebook, and other
    postings
  • Announced in Financial
    Times that he had located
    the “leaders” of
    Anonymous and would
    reveal them in a few days
Layer one 2011-sam-bowne-layer-7-dos
Social Engineering & SQLi




•   http://tinyurl.com/4gesrcj
Leaked HB Gary Emails
• For Bank of America
• Discredit Wikileaks
• Intimidate Journalist Glenn Greenwald
• For the Chamber of Commerce
• Discredit the watchdog group US Chamber Watch
• Using fake social media accounts
• For the US Air Force
• Spread propaganda with fake accounts
•   http://tinyurl.com/4anofw8
Drupal Exploit
Th3j35t3r
• "Hacktivist for Good"
• Claims to be ex-military
• Originally performed DoS attacks on Jihadist
  sites
   • Bringing them down for brief periods, such
     as 30 minutes
   • Announces his attacks on Twitter, discusses
     them on a blog and live on irc.2600.net
Jester's Tweets from Dec 2010
Th3j35t3r v. Wikileaks
• He brought down Wikileaks single-handed
  for more than a day
   – I was chatting with him in IRC while he
     did it, and he proved it was him by
     briefly pausing the attack
Wikileaks Outage




• One attacker, no botnet
Th3j35t3r
• After his Wikileaks attack
  • He battled Anonymous
  • He claims to have trojaned a tool the Anons
    downloaded
  • He claims to pwn Anon insiders now
Jester's Tweets
Westboro Baptist Outage




• 4 sites held down for 8 weeks
• From a single 3G cell phone
   – http://tinyurl.com/4vggluu
Layer 4 DDoS
Many Attackers – One Target
 Bandwidth Consumption
Companies that Refused Service to
           Wikileaks
•   Amazon
•   Paypal
•   Mastercard
•   Visa
•   Many others
Low Orbit Ion Cannon
• Primitive DDoS Attack, controlled via IRC
• Sends thousands of packets per second from
  the attacker directly to the target
• Like throwing a brick through a window
• Takes thousands of participants to bring down
  a large site
   • They tried but failed to bring down Amazon
Low Orbit Ion Cannon
Operation Payback v. Mastercard
• Brought down Visa, Mastercard, and many
  other sites
   – Easily tracked, and easily blocked
   – High bandwidth, cannot be run through
     anonymizer
   – Dutch police have already arrested two
     participants
Mastercard Outage




3,000 to 30,000 attackers working together
Layer one 2011-sam-bowne-layer-7-dos
Layer 7 DoS

One Attacker – One Target
Exhausts Server Resources
Layer 7 DoS
•   Subtle, concealable attack
•   Can be routed through proxies
•   Low bandwidth
•   Can be very difficult to distinguish from
    normal traffic
HTTP GET
SlowLoris
• Send incomplete GET
  requests
• Freezes Apache with
  one packet per second
R-U-Dead-Yet
• Incomplete HTTP POSTs
• Stops IIS, but requires thousands of
  packets per second
Keep-Alive DoS
• HTTP Keep-Alive allows 100 requests in a
  single connection
• HEAD method saves resources on the
  attacker
• Target a page that is expensive for the server
  to create, like a search
  – http://www.esrun.co.uk/blog/keep-alive-dos-script/
• A php script
  – pkp keep-dead.php
keep-dead
XerXes
• Th3j35t3r's DoS Tool
   • Routed through proxies like Tor to hide the
     attacker's origin
   • No one knows exactly what it does
   • Layer 7 DoS?
XerXes
Link-Local DoS
IPv6 Router Advertisements
IPv4: DHCP
PULL process
 Client requests an IP
 Router provides one



                  I need an IP

                  Use this IP

    Host                         Router
IPv6: Router Advertisements

PUSH process
 Router announces its presence
 Every client on the LAN creates an address and joins
  the network

               JOIN MY NETWORK

                 Yes, SIR

    Host                         Router
Router Advertisement Packet
RA Flood
Windows Vulnerability
• It takes a LOT of CPU for Windows to process
  those Router Advertisements
• 5 packets per second drives the CPU to 100%
• And they are sent to every machine in the LAN
  (ff02::1 is Link-Local All Nodes Multicast)
• One attacker kills all the Windows machines on
  a LAN
Responsible Disclosure
•   Microsoft was alerted by Marc Heuse on July 10, 2010
•   Microsoft does not plan to patch this
•   Juniper and Cisco devices are also vulnerable
•   Cisco has released a patch, Juniper has not
Defenses from RA Floods
•   Disable IPv6
•   Turn off Router Discovery
•   Block rogue RAs with a firewall
•   Get a switch with RA Guard
RA Guard Evasion
• Add "Fragmentation Headers" to the RA
  Packets
  – http://samsclass.info/ipv6/proj/RA-evasion.html
Fragmentation Headers
Defending Websites
Attack > Defense
• Right now, your website is only up
  because
   – Not even one person hates you, or
   – All the people that hate you are ignorant
     about network security
Defense
• Mod Security--free open-source defense
  tool
   • Latest version has some protections
     against Layer 7 DoS

• Akamai has good defense solutions
  • Caching
  • DNS Redirection
  • Javascript second-request trick
Load Balancer
Counterattacks
• Reflecting attacks back to the command &
  control server
• Effective against dumb attackers like
  Anonymous' LOIC
   – Will lose effect if they ever learn about
     Layer 7 DoS, which is happening now
References
References
Anonymous Takes Down U.S. Chamber Of Commerce And
Supporter Websites
 http://goo.gl/Mue9k

Slowloris HTTP DoS
 http://ha.ckers.org/slowloris/

OWASP HTTP DoS Tool
 http://code.google.com/p/owasp-dos-http-post/

Mitigating Slow HTTP DoS Attacks
http://blog.spiderlabs.com/2010/11/advanced-topic-of-the-
week-mitigating-slow-http-dos-attacks.html

‘Tis the Season of DDoS – WikiLeaks Edition (Outage charts)
 http://goo.gl/V5jZc
References
ModSecurity
http://goo.gl/56hbl

Akamai DDoS Report
 http://baythreat.org/MichaelSmith_DDoS.pdf

How Secure Is Julian Assange's "Thermonuclear"
Insurance File?
 http://goo.gl/sY6Nn

Overview of Anonymous and their attack on MasterCard:
 http://goo.gl/lVsCD

Operation Payback Toolkit: LOIC and HiveMind
 http://pastehtml.com/view/1c8i33u.html
References
r-u-dead-yet
 http://code.google.com/p/r-u-dead-yet/

Keep-Alive DoS Script
 http://www.esrun.co.uk/blog/keep-alive-dos-script/

Router Advertisement DoS in Windows
 http://samsclass.info/ipv6/proj/flood-router6a.htm

RA Guard Evasion
 http://samsclass.info/ipv6/proj/RA-evasion.html

XerXes Attack Video
http://goo.gl/j8NQE

More Related Content

PDF
Fear, Uncertainty and Doubt
PDF
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
PDF
Defcon 22-metacortex-grifter-darkside-of-the-internet
PDF
AtlSecCon 2016
PPTX
The Ransomware Threat: Tracking the Digitial Footprints
PDF
Fade from Whitehat... to Black
PDF
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
PPTX
Dark web
Fear, Uncertainty and Doubt
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-metacortex-grifter-darkside-of-the-internet
AtlSecCon 2016
The Ransomware Threat: Tracking the Digitial Footprints
Fade from Whitehat... to Black
Botnets - What, How and Why by Utsav Mittal @ OWASP Delhi July, 2014 Monthly ...
Dark web

What's hot (16)

PPTX
Assessing a pen tester: Making the right choice when choosing a third party P...
PPTX
Mo and Tao 魔与道
PPTX
Defcon Crypto Village - OPSEC Concerns in Using Crypto
PPTX
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
PPT
[ENG] IPv6 shipworm + My little Windows domain pwnie
PPTX
Ransomware the clock is ticking
PDF
Bitcoin and Ransomware Analysis
PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PPTX
In the Line of Fire-the Morphology of Cyber Attacks
PDF
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
PDF
Survival in an Evolving Threat Landscape
PPTX
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
PPTX
Threat hunting in_windows
PPSX
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
PPSX
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
PDF
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Assessing a pen tester: Making the right choice when choosing a third party P...
Mo and Tao 魔与道
Defcon Crypto Village - OPSEC Concerns in Using Crypto
There's always money in the banana stand: A BLUE TEAMER’S GUIDE TO COBALT STRIKE
[ENG] IPv6 shipworm + My little Windows domain pwnie
Ransomware the clock is ticking
Bitcoin and Ransomware Analysis
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
In the Line of Fire-the Morphology of Cyber Attacks
Thotcon 0x5 - Retroactive Wiretapping VPN over DNS
Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
Threat hunting in_windows
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา
โครงงานการพัฒนาเว็บไซต์เรื่อง Hacking ชลธิชา.อรวดี.อรอุมา1
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Ad

Viewers also liked (16)

PPTX
piel y anexos h
DOCX
Shooting schedule overview BlueSkyStudios day 1
PDF
Unidad2.procesos políticos.
PDF
Organigrama de empresa forestal
PDF
Sistemas de certificacion forestal
PDF
Planeación de Caminos Forestales
DOCX
Maquinaria y equipo
PPTX
Algorithm Design & Implementation
PPTX
hiperkolesterolemia (hypercolesterolemia)
PDF
2 programa curricular-de-educacion-primaria-2017
PDF
Programa Nacional de Saúde Escolar
PPT
"O espantalho enamorado" de Guido Visconti
PPT
Atención a la diversidad1516
PPT
Programación didáctica parte 2
DOCX
FYS Partner Photo 5
DOC
Deepak new resume 2016
piel y anexos h
Shooting schedule overview BlueSkyStudios day 1
Unidad2.procesos políticos.
Organigrama de empresa forestal
Sistemas de certificacion forestal
Planeación de Caminos Forestales
Maquinaria y equipo
Algorithm Design & Implementation
hiperkolesterolemia (hypercolesterolemia)
2 programa curricular-de-educacion-primaria-2017
Programa Nacional de Saúde Escolar
"O espantalho enamorado" de Guido Visconti
Atención a la diversidad1516
Programación didáctica parte 2
FYS Partner Photo 5
Deepak new resume 2016
Ad

Similar to Layer one 2011-sam-bowne-layer-7-dos (20)

PPT
Dos threats and countermeasures
PDF
Cyber espionage - Tinker, taylor, soldier, spy
PPTX
Security News Bytes (Aug Sept 2017)
PPTX
Crypto Miners in the Cloud
PPTX
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
PPT
PPTX
Pichman privacy, the dark web, &amp; hacker devices i school (1)
PDF
Security events in 2014
PDF
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
PDF
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
PDF
Virus Bulletin 2012
PPTX
DoS or DDoS attack
PPTX
Session for InfoSecGirls - New age threat management vol 1
PPTX
Information about malwares and Attacks.pptx
PPTX
Dark Web and Privacy
PPTX
Attacks on the cyber world
PPTX
Bh europe 2013_wilhoit
PPTX
News Bytes - May 2015
PPT
All about Hacking
PDF
Top 10 Threats to Cloud Security
Dos threats and countermeasures
Cyber espionage - Tinker, taylor, soldier, spy
Security News Bytes (Aug Sept 2017)
Crypto Miners in the Cloud
BSides Algiers - Layer7 DoS Attacks - Oussama Elhamer
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Security events in 2014
Cyber-crime and attacks in the dark side of the web - Marco Balduzzi - Codemo...
Marco Balduzzi - Cyber-crime and attacks in the dark side of the web - Codemo...
Virus Bulletin 2012
DoS or DDoS attack
Session for InfoSecGirls - New age threat management vol 1
Information about malwares and Attacks.pptx
Dark Web and Privacy
Attacks on the cyber world
Bh europe 2013_wilhoit
News Bytes - May 2015
All about Hacking
Top 10 Threats to Cloud Security

More from fangjiafu (20)

PDF
Wce internals rooted_con2011_ampliasecurity
PDF
Oracle forensics 101
PDF
Understanding and selecting_dsp_final
PDF
Wce12 uba ampliasecurity_eng
PDF
Ddos analizi
PDF
Bypass dbms assert
PDF
Cursor injection
PDF
Create user to_sysdba
PPT
Presentation nix
PDF
Layer 7 ddos
PDF
Tlsoptimizationprint 120224194603-phpapp02
PDF
Crypto hlug
PDF
PPT
Presentation nix
PDF
Rr 7944
PDF
Proper passwordhashing
PDF
Burp suite injection中的应用by小冰
PDF
Oech03
PDF
2008 07-24 kwpm-threads_and_synchronization
PDF
Unit07
Wce internals rooted_con2011_ampliasecurity
Oracle forensics 101
Understanding and selecting_dsp_final
Wce12 uba ampliasecurity_eng
Ddos analizi
Bypass dbms assert
Cursor injection
Create user to_sysdba
Presentation nix
Layer 7 ddos
Tlsoptimizationprint 120224194603-phpapp02
Crypto hlug
Presentation nix
Rr 7944
Proper passwordhashing
Burp suite injection中的应用by小冰
Oech03
2008 07-24 kwpm-threads_and_synchronization
Unit07

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation_ Review paper, used for researhc scholars
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks

Layer one 2011-sam-bowne-layer-7-dos

  • 1. Layer 7 DoS Attacks and Defenses LayerOne, 2011
  • 2. Bio
  • 3. Summary • The DoS Circus • Layer 4 DDoS: Thousands of attackers bring down one site • Layer 7 DoS: One attacker brings down one site • Link-Local DoS: IPv6 RA Attack: One attacker brings down a whole network
  • 4. The DoS Circus Characters
  • 5. Wikileaks • Published <1000 US Gov't diplomatic cables from a leak of 250,000 • Distributed an encrypted "Insurance" file by BitTorrent • Widely assumed to contain the complete, uncensored leaked data • Encrypted with AES-256--no one is ever getting in there without the key • Key to be released if Assange is jailed or killed, but he is in UK now resisting extradition to Sweden and the key has not been released
  • 7. Operation Payback • 4chan's Anonymous group • Attacked Scientology websites in 2008 • Attacked the RIAA and other copyright defenders • Using the Low Orbit Ion Cannon with HiveMind (DDoS) • "Opt-in Botnet"
  • 8. HB Gary Federal • Aaron Barr • Developed a questionable way to track people down online • By correlating Twitter, Facebook, and other postings • Announced in Financial Times that he had located the “leaders” of Anonymous and would reveal them in a few days
  • 10. Social Engineering & SQLi • http://tinyurl.com/4gesrcj
  • 11. Leaked HB Gary Emails • For Bank of America • Discredit Wikileaks • Intimidate Journalist Glenn Greenwald • For the Chamber of Commerce • Discredit the watchdog group US Chamber Watch • Using fake social media accounts • For the US Air Force • Spread propaganda with fake accounts • http://tinyurl.com/4anofw8
  • 13. Th3j35t3r • "Hacktivist for Good" • Claims to be ex-military • Originally performed DoS attacks on Jihadist sites • Bringing them down for brief periods, such as 30 minutes • Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net
  • 15. Th3j35t3r v. Wikileaks • He brought down Wikileaks single-handed for more than a day – I was chatting with him in IRC while he did it, and he proved it was him by briefly pausing the attack
  • 16. Wikileaks Outage • One attacker, no botnet
  • 17. Th3j35t3r • After his Wikileaks attack • He battled Anonymous • He claims to have trojaned a tool the Anons downloaded • He claims to pwn Anon insiders now
  • 19. Westboro Baptist Outage • 4 sites held down for 8 weeks • From a single 3G cell phone – http://tinyurl.com/4vggluu
  • 20. Layer 4 DDoS Many Attackers – One Target Bandwidth Consumption
  • 21. Companies that Refused Service to Wikileaks • Amazon • Paypal • Mastercard • Visa • Many others
  • 22. Low Orbit Ion Cannon • Primitive DDoS Attack, controlled via IRC • Sends thousands of packets per second from the attacker directly to the target • Like throwing a brick through a window • Takes thousands of participants to bring down a large site • They tried but failed to bring down Amazon
  • 23. Low Orbit Ion Cannon
  • 24. Operation Payback v. Mastercard • Brought down Visa, Mastercard, and many other sites – Easily tracked, and easily blocked – High bandwidth, cannot be run through anonymizer – Dutch police have already arrested two participants
  • 25. Mastercard Outage 3,000 to 30,000 attackers working together
  • 27. Layer 7 DoS One Attacker – One Target Exhausts Server Resources
  • 28. Layer 7 DoS • Subtle, concealable attack • Can be routed through proxies • Low bandwidth • Can be very difficult to distinguish from normal traffic
  • 30. SlowLoris • Send incomplete GET requests • Freezes Apache with one packet per second
  • 31. R-U-Dead-Yet • Incomplete HTTP POSTs • Stops IIS, but requires thousands of packets per second
  • 32. Keep-Alive DoS • HTTP Keep-Alive allows 100 requests in a single connection • HEAD method saves resources on the attacker • Target a page that is expensive for the server to create, like a search – http://www.esrun.co.uk/blog/keep-alive-dos-script/ • A php script – pkp keep-dead.php
  • 34. XerXes • Th3j35t3r's DoS Tool • Routed through proxies like Tor to hide the attacker's origin • No one knows exactly what it does • Layer 7 DoS?
  • 36. Link-Local DoS IPv6 Router Advertisements
  • 37. IPv4: DHCP PULL process  Client requests an IP  Router provides one I need an IP Use this IP Host Router
  • 38. IPv6: Router Advertisements PUSH process  Router announces its presence  Every client on the LAN creates an address and joins the network JOIN MY NETWORK Yes, SIR Host Router
  • 41. Windows Vulnerability • It takes a LOT of CPU for Windows to process those Router Advertisements • 5 packets per second drives the CPU to 100% • And they are sent to every machine in the LAN (ff02::1 is Link-Local All Nodes Multicast) • One attacker kills all the Windows machines on a LAN
  • 42. Responsible Disclosure • Microsoft was alerted by Marc Heuse on July 10, 2010 • Microsoft does not plan to patch this • Juniper and Cisco devices are also vulnerable • Cisco has released a patch, Juniper has not
  • 43. Defenses from RA Floods • Disable IPv6 • Turn off Router Discovery • Block rogue RAs with a firewall • Get a switch with RA Guard
  • 44. RA Guard Evasion • Add "Fragmentation Headers" to the RA Packets – http://samsclass.info/ipv6/proj/RA-evasion.html
  • 47. Attack > Defense • Right now, your website is only up because – Not even one person hates you, or – All the people that hate you are ignorant about network security
  • 48. Defense • Mod Security--free open-source defense tool • Latest version has some protections against Layer 7 DoS • Akamai has good defense solutions • Caching • DNS Redirection • Javascript second-request trick
  • 50. Counterattacks • Reflecting attacks back to the command & control server • Effective against dumb attackers like Anonymous' LOIC – Will lose effect if they ever learn about Layer 7 DoS, which is happening now
  • 52. References Anonymous Takes Down U.S. Chamber Of Commerce And Supporter Websites http://goo.gl/Mue9k Slowloris HTTP DoS http://ha.ckers.org/slowloris/ OWASP HTTP DoS Tool http://code.google.com/p/owasp-dos-http-post/ Mitigating Slow HTTP DoS Attacks http://blog.spiderlabs.com/2010/11/advanced-topic-of-the- week-mitigating-slow-http-dos-attacks.html ‘Tis the Season of DDoS – WikiLeaks Edition (Outage charts) http://goo.gl/V5jZc
  • 53. References ModSecurity http://goo.gl/56hbl Akamai DDoS Report http://baythreat.org/MichaelSmith_DDoS.pdf How Secure Is Julian Assange's "Thermonuclear" Insurance File? http://goo.gl/sY6Nn Overview of Anonymous and their attack on MasterCard: http://goo.gl/lVsCD Operation Payback Toolkit: LOIC and HiveMind http://pastehtml.com/view/1c8i33u.html
  • 54. References r-u-dead-yet http://code.google.com/p/r-u-dead-yet/ Keep-Alive DoS Script http://www.esrun.co.uk/blog/keep-alive-dos-script/ Router Advertisement DoS in Windows http://samsclass.info/ipv6/proj/flood-router6a.htm RA Guard Evasion http://samsclass.info/ipv6/proj/RA-evasion.html XerXes Attack Video http://goo.gl/j8NQE