SlideShare a Scribd company logo
Open Source 
Incidents 
David Hobbs 
Director of Security Solutions 
Emergency Response Team 
DavidH@Radware.com 
September 2014 
Radware Confidential September 2014
DDoS is the Most Common Cyber Attack 
2 
28% attack 
of all cyber attacks in 
2013 involved a DDoS 
Source: 
2013 
Cyber 
A1acks 
Trends, 
Hackmagedon
2013 Attack Motivation - ERT Survey 
Radware Confidential Jan 2012 Slide 3
DDoS Ring of Fire 
4
The Network Topology and DDoS Attacks 
Server 
components 
that 
are 
likely 
to 
be 
a1acked 
by 
DDoS 
A1acks 
5c
What are we talking about? 
6
ShellShock Demo 
Slide 7
Bash Exploit 
• This still works with the latest bash update 
• (X='() { (a)=>' bash -c "echo ls /etc; cat echo") 
• As does this: 
• env X="() { :;} ; echo busted" /bin/sh -c "echo stuff” 
• The following commands will implement a signature in ‘Report Only’ mode in our 
DefensePro. 
• 
• dp signatures-protection filter basic-filters user create ERT-bash2-CVE-2014-6271 -p 
tcp -c x28x29x20x7b -ct "Normalized URL" -ce "Case Sensitive" -dp http 
• dp signatures-protection filter advanced-filters user create group_ERT-bash2- 
CVE-2014-6271 ERT-bash2-CVE-2014-6271 
• dp signatures-protection attacks user create 0 -n ERT-bash2-CVE-2014-6271 -f 
group_ERT-bash2-CVE-2014-6271 -am 0 
• dp update-policies set 1 
• 
• The customer should carefully inspect false positive rates of this signature and only 
afterwards to move it to ‘Block and Report’ mode. 
Slide 8
Booter DDOS Tools are Cheep 
Slide 9 
h"p://ragebooter.net/members/plans 
Can be run from any device anywhere - Can be used to create huge dos floods, and more!
Thank You 
www.radware.com 
Radware Confidential Jan 2012

More Related Content

PPTX
An experiment in agile threat modelling
PDF
Lateral Movement: How attackers quietly traverse your Network
PPTX
External to DA, the OS X Way
PDF
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
PPTX
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
PDF
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
PDF
Anatomy of a Cloud Hack
PPTX
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
An experiment in agile threat modelling
Lateral Movement: How attackers quietly traverse your Network
External to DA, the OS X Way
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
SWAT Style – Live Network Crypto Hacking and Exploitation by Kevin Cardwell a...
Anatomy of a Cloud Hack
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure

What's hot (20)

PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
PDF
Bsides NYC 2018 - Hunting for Lateral Movement
PDF
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
PPTX
Enterprise Linux Exploit Mapper (ELEM) Demo
PDF
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
PPTX
PHDays 8: Vulnerability Databases. Sifting thousands tons of verbal ore
PPTX
Sticky Keys to the Kingdom
PPTX
Living off the land and fileless attack techniques
PPTX
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
PPTX
Hunting for APT in network logs workshop presentation
PDF
Automatiza las detecciones de amenazas y evita falsos positivos
PDF
CSW2017 chuanda ding_state of windows application security
PPTX
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
PDF
The Rising Threat of Fileless Malware
PDF
SELinux Kernel Internals and Architecture - FOSS.IN/2005
PPTX
Incident Response for the Work-from-home Workforce
PDF
Shamoon
PDF
Antivirus is hopeless
PDF
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
PDF
Syrian Malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Bsides NYC 2018 - Hunting for Lateral Movement
【HITCON FreeTalk 2018 - Spectre & Meltdown 漏洞的修補策略與 risk mitigation】
Enterprise Linux Exploit Mapper (ELEM) Demo
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
PHDays 8: Vulnerability Databases. Sifting thousands tons of verbal ore
Sticky Keys to the Kingdom
Living off the land and fileless attack techniques
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
Hunting for APT in network logs workshop presentation
Automatiza las detecciones de amenazas y evita falsos positivos
CSW2017 chuanda ding_state of windows application security
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
The Rising Threat of Fileless Malware
SELinux Kernel Internals and Architecture - FOSS.IN/2005
Incident Response for the Work-from-home Workforce
Shamoon
Antivirus is hopeless
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
Syrian Malware
Ad

Viewers also liked (9)

PDF
Economic Development and the Cloud: The Alberta Advantage -- Nathan Armstrong...
PPT
Cybera - ISAC Update 2010
PDF
Communities in the Clouds - Andy Blundell, C3T Action Research Corp.
PDF
Ecosys Experiment Engine
PPTX
GeoCENS presentation on Angelo Coast Range Reserve Environmental Sensor Obse...
PDF
Engineering Operations
PDF
Cybera - ISAC
PPTX
GeoCENS Source Talk: Results from an Atlantic Rainforest Micrometeorology Sen...
PDF
The Future of Net Neutrality: What's at stake for Canadians
Economic Development and the Cloud: The Alberta Advantage -- Nathan Armstrong...
Cybera - ISAC Update 2010
Communities in the Clouds - Andy Blundell, C3T Action Research Corp.
Ecosys Experiment Engine
GeoCENS presentation on Angelo Coast Range Reserve Environmental Sensor Obse...
Engineering Operations
Cybera - ISAC
GeoCENS Source Talk: Results from an Atlantic Rainforest Micrometeorology Sen...
The Future of Net Neutrality: What's at stake for Canadians
Ad

Similar to Open Source Incidents (20)

PDF
Advanced System Security and Digital Forensics
PDF
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
PDF
Serverless security: defence against the dark arts
PDF
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
PDF
Security in serverless world
PDF
DEFCON 27 - ALEXANDRE BORGES - dot net malware threats
PDF
Tools & techniques, building a dev secops culture at mozilla sba live a...
PDF
Cansecwest - The Death of AV defence in depth
PPTX
The Log4Shell Vulnerability – explained: how to stay secure
PDF
Attacking antivirus
PDF
UQ_Cybercrime_Professionalism_Lecture_2024_07.pdf
PDF
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
PDF
Formbook - In-depth malware analysis (Botconf 2018)
PPTX
C# Production Debugging Made Easy
PDF
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
PDF
Security Development Lifecycle Tools
PDF
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
PPTX
The bash vulnerability practical tips to secure your environment
PPTX
Nozzle: A Defense Against Heap-spraying Code Injection Attacks
PPT
Layer 7 Technologies: Web Services Hacking And Hardening
Advanced System Security and Digital Forensics
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
Serverless security: defence against the dark arts
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
Security in serverless world
DEFCON 27 - ALEXANDRE BORGES - dot net malware threats
Tools & techniques, building a dev secops culture at mozilla sba live a...
Cansecwest - The Death of AV defence in depth
The Log4Shell Vulnerability – explained: how to stay secure
Attacking antivirus
UQ_Cybercrime_Professionalism_Lecture_2024_07.pdf
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
Formbook - In-depth malware analysis (Botconf 2018)
C# Production Debugging Made Easy
.NET MALWARE THREATS -- BHACK CONFERENCE 2019
Security Development Lifecycle Tools
"Intrusion Techniques (Open Source Tools)" por Ewerson Guimarães por
The bash vulnerability practical tips to secure your environment
Nozzle: A Defense Against Heap-spraying Code Injection Attacks
Layer 7 Technologies: Web Services Hacking And Hardening

More from Cybera Inc. (20)

PDF
Cyber Summit 2016: Technology, Education, and Democracy
PPTX
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
PPT
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
PPTX
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
PPTX
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
PDF
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
PPTX
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
PDF
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
PDF
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
PPT
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
PPT
Privacy, Security & Access to Data
PDF
Do Universities Dream of Big Data
PDF
Predicting the Future With Microsoft Bing
PPTX
Analytics 101: How to not fail at analytics
PPTX
Are MOOC's past their peak?
PPTX
Opening the doors of the laboratory
PPTX
Open City - Edmonton
PPTX
Unlocking the power of healthcare data
PPT
Checking in on Healthcare Data Analytics
PPTX
Open access and open data: international trends and strategic context
Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Privacy, Security & Access to Data
Do Universities Dream of Big Data
Predicting the Future With Microsoft Bing
Analytics 101: How to not fail at analytics
Are MOOC's past their peak?
Opening the doors of the laboratory
Open City - Edmonton
Unlocking the power of healthcare data
Checking in on Healthcare Data Analytics
Open access and open data: international trends and strategic context

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
1. Introduction to Computer Programming.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
OMC Textile Division Presentation 2021.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25-Week II
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
1. Introduction to Computer Programming.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Encapsulation_ Review paper, used for researhc scholars
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TLE Review Electricity (Electricity).pptx
Mushroom cultivation and it's methods.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
A comparative study of natural language inference in Swahili using monolingua...
Machine Learning_overview_presentation.pptx
Machine learning based COVID-19 study performance prediction

Open Source Incidents

  • 1. Open Source Incidents David Hobbs Director of Security Solutions Emergency Response Team DavidH@Radware.com September 2014 Radware Confidential September 2014
  • 2. DDoS is the Most Common Cyber Attack 2 28% attack of all cyber attacks in 2013 involved a DDoS Source: 2013 Cyber A1acks Trends, Hackmagedon
  • 3. 2013 Attack Motivation - ERT Survey Radware Confidential Jan 2012 Slide 3
  • 4. DDoS Ring of Fire 4
  • 5. The Network Topology and DDoS Attacks Server components that are likely to be a1acked by DDoS A1acks 5c
  • 6. What are we talking about? 6
  • 8. Bash Exploit • This still works with the latest bash update • (X='() { (a)=>' bash -c "echo ls /etc; cat echo") • As does this: • env X="() { :;} ; echo busted" /bin/sh -c "echo stuff” • The following commands will implement a signature in ‘Report Only’ mode in our DefensePro. • • dp signatures-protection filter basic-filters user create ERT-bash2-CVE-2014-6271 -p tcp -c x28x29x20x7b -ct "Normalized URL" -ce "Case Sensitive" -dp http • dp signatures-protection filter advanced-filters user create group_ERT-bash2- CVE-2014-6271 ERT-bash2-CVE-2014-6271 • dp signatures-protection attacks user create 0 -n ERT-bash2-CVE-2014-6271 -f group_ERT-bash2-CVE-2014-6271 -am 0 • dp update-policies set 1 • • The customer should carefully inspect false positive rates of this signature and only afterwards to move it to ‘Block and Report’ mode. Slide 8
  • 9. Booter DDOS Tools are Cheep Slide 9 h"p://ragebooter.net/members/plans Can be run from any device anywhere - Can be used to create huge dos floods, and more!
  • 10. Thank You www.radware.com Radware Confidential Jan 2012