UiPath Community: Communication Mining from Zero to Hero
Editor's Notes
Denial of Service Attacks
Distributed Denial of Service Attack (DDoS) Definition
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
Types of DoS Attacks
The most common type of Denial of Service attack involves flooding the target resource with external communication requests. This overload prevents the resource from responding to legitimate traffic, or slows its response so significantly that it is rendered effectively unavailable.
Resources targeted in a DoS attack can be a specific computer, a port or service on the targeted system, an entire network, a component of a given network any system component. DoS attacks may also target human-system communications (e.g. disabling an alarm or printer), or human-response systems (e.g. disabling an important technician's phone or laptop).
DoS attacks can also target tangible system resources, such as computational resources (bandwidth, disk space, processor time); configuration information (routing information, etc.); state information (for example, unsolicited TCP session resetting). Moreover, a DoS attack can be designed to: execute malware that maxes out the processor, preventing usage; trigger errors in machine microcode or sequencing of instructions, forcing the computer into an unstable state; exploit operating system vulnerabilities to sap system resources; crash the operating system altogether.
The overriding similarity in these examples is that, as a result of the successful Denial of Service attack, the system in question does not respond as before, and service is either denied or severly limited.
Sources of Denial of Service Attacks
"If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.”
Richard Clarke
DoS attacks are low-cost, and difficult to counter without the right tools. This makes them highly-popular even for people with technical knowledge. In fact, DoS services are offered on some web sites starting at $50. These services have grown more and more sophisticated, and can effectively exploit application vulnerabilities and evade detection by firewalls.
According to market research, DoS attacks largely originate from people with a grudge or complaint against a web site or company, competitors looking to increase market share by damaging commercial web availability, or criminal elements that systematically extort web site owners by holding his assets for ransom.
Difference Between DoS and DDoS Attack
It is important to differentiate between Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.
In a DoS attack, one computer and one internet connection is used to flood a server with packets, with the aim of overloading the targeted server’s bandwidth and resources.
DDoS attack, uses many devices and multiple Internet connections, often distributed globally into what is referred to as a botnet. A DDoS attack is, therefore, much harder to deflect, simply because there is no single attacker to defend from, as the targeted resource will be flooded with requests from many hundreds and thousands of multiple sources.
There are basically three types of DDOS attacks:
Application-layer DDOS attack
Protocol DOS attack
Volume-based DDOS attack
Application layer DDOS attack: Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server.
Protocol DDOS attack: A protocol DDOS attacks is a DOS attack on the protocol level. This category includes Synflood, Ping of Death, and more.
Volume-based DDOS attack: This type of attack includes ICMP floods, UDP floods, and other kind of floods performed via spoofed packets.
Botnets are moving toward a more P2P-like communication strategy, but there remain 'nets which rely on a single server. Bots have been spotted running on compromised Web servers, too, so that they can easily exploit browser vulnerabilities on their victims. Code running on a Web server can be considered a "server side" of botnets, and so can an actual bot server. In this article, we would like to explore what capabilities a bot server has, as well as talk about some Web exploitation kits.
Command and Control
Regardless of the fact that P2P technologies are starting to be used for communication between bots, it is still useful to understand how the less evolved bots function. The new P2P-enabled bots have the same functionality at their core, so the concept is the same.
A bot herder who controls a bot server (or multiple servers) has at his disposal a number of interesting tools. We briefly talked about what botnets are used for in the introduction to this series, but now let's take a more detailed look at the actual commands a server can send to bot clients.