Zum Inhalt wechseln

Als Gast hast du nur eingeschränkten Zugriff!


Anmelden 

Benutzerkonto erstellen

Du bist nicht angemeldet und hast somit nur einen sehr eingeschränkten Zugriff auf die Features unserer Community.
Um vollen Zugriff zu erlangen musst du dir einen Account erstellen. Der Vorgang sollte nicht länger als 1 Minute dauern.

  • Antworte auf Themen oder erstelle deine eigenen.
  • Schalte dir alle Downloads mit Highspeed & ohne Wartezeit frei.
  • Erhalte Zugriff auf alle Bereiche und entdecke interessante Inhalte.
  • Tausche dich mich anderen Usern in der Shoutbox oder via PN aus.
 

   

Foto

[EN] Layer Seven DDoS Attacks

- - - - -

  • Bitte melde dich an um zu Antworten
Keine Antworten in diesem Thema

#1
PaulaAbdul

PaulaAbdul

    Favoured Management

  • Administration
  • Likes
    3723
  • 2157 Beiträge
  • 3717 Bedankt
  • 1337-699
  • verifiziert
  • Android [root]
  • Windows, Linux
What is Layer 7?

The process of sending and receiving data from one host to another, data encapsulation, is possible due to the existence of a seven layer protocol suite presented as the OSI model (see diagram 1).

Although while examining DoS attacks, we??™ll occasionally refer to various layers of this OSI model, special emphasis is to be laid upon the seventh layer, the application layer. In essence, it procures an interface to end-user tasks, and facilitates programs such as web browsers, email services, and photo applications in sending network communications (e.g., SMTP or HTTP).


Eingefügtes Bild



Layer 7 DDoS Attacks Compared to Other Types


The tendency of DDoS attacks shows infallibly that perpetrators take aim and move up the OSI network model over time. The relocation of the prime target is logical, since more DDoS defence systems focus their primary detection powers on lower layers (Imperva, 2012). Therefore, attacks on the web application layer are increasingly popular. Furthermore, layer seven penetration, the top layer in the OSI model, provides an outlet on a business logic layer, which is considered an abstract extension of the aforementioned network protocol suite (F5 Networks, Inc. 2013).

Given that the internet is built vertically by multiple protocol layers, it would be perfectly understandable if internet DDoS attacks assume a vertical classification, as well (Abliz, 2011).



If we adopt this approach, some common types of DDoS attacks include:
  • IP attacks on the network bandwidth ??“ Layer 3 (Network Protocol)
  • TCP attacks on server sockets ??“ Layer 4 (Transport Protocol)
  • HTTP attacks on Web server threads ??“ layer seven (Application Protocol)
  • Web application attacks on CPU resources ??“ layer seven+

Now that we grasp the difference between DDoS attacks, in terms of OSI model classification, let??™s go through some general features that distinguish layer seven DDoS attacks from others:

While network layer DDoS attacks attempt to overwhelm the victim server with bogus requests, the application layer DDoS attacks rely on legitimate ones (Beitollahi & Deconinck, 2011).
  • In layer seven DDoS attacks, attacking computers have to set up a full TCP connection. Thus, while providing genuine IP addresses is something you cannot dispense with, the entire action proceeding may seem legitimate in the absence of traffic spikes. They may virtually swindle even a vigilant DDoS defence mechanism, and they??™re stealthy. (Manthena, 2011).
  • A layer seven DDoS attack, in contrast to the others, may exploit vulnerabilities in application software, thus circumventing detection and aiming directly at the targeted Web server (Manthena, 2011). In other words, they are more sophisticated, since they do not count entirely on a brute force to achieve desired ends.
  • Perhaps the most notable difference; so-called volumetric DDoS attacks strive to bring down network infrastructure and servers by employing high-bandwidth-consuming flooding. That benefits from an inherent blind spot of the internet medium. On the other hand, layer seven DDoS attacks take the victim server in the rear, first engaging well-known applications such as Hypertext Transfer Protocol (HTTP), Voice Over Internet Protocol (VoIP), or Domain Name System (DNS) (Arbor Networks, Inc. 2012).
  • The goal of application layer DDoS attacks usually have nothing to do with overwhelming bandwidth. Some IT experts call them ???low and slow??? for a reason. Frequently, at close range are exhausted CPU or memory resources. Hence, layer seven DDoS leverage as well inherent flaws and limitations of applications, for example, system resources are always finite. There??™s surprise here actually. Heavy resource consumption will eventually render the server incapacitated (Imperva, 2012).
  • Protection and mitigation of common volumetric attacks is something that IT specialists are well familiar with. In contrast, layer seven DDoS attacks often stand as a more formidable challenge (Breaking Point Labs, 2011).
The outlined picture of importance and future prevalence of application layer DdoS attacks was shared by experts from the OWAS Foundation in 2010: ???We believe layer seven attacks may supersede layer four as the modus operandi of DDoS botnets in this new decade (Breaking Point Labs, 2011, par. 5).???



Layer Seven DDoS Attacks Statistics

To continue the layer seven DDoS topic, let??™s review a couple of interesting sources of relevant statistics. First, according to Arbor??™s statistical information, with an over 102% increase of DDoS attack size when compared to the previous year, 2010 appears to be a cornerstone in DDoS evolution. A year later, a Radware Security Survey: Attack Count by Type and Bandwidth claims that application layer attacks are prevalent:


In 2012, Prolex??™s annual report mentioned a 42.97 % growth in layer seven DdoS attacks:



In 2012, Prolex??™s annual report mentioned a 42.97 % growth in layer seven DdoS attacks:



In addition, quarterly reports by Prolex show a definite tendency of increasing popularity,

particularly of HTTP GET DDoS attacks in the period from April 2012 to June 2013:





Slowloris isn??™t a flooding tool, and normally only a minimally distributed effort is needed to work. Some web servers that are vulnerable to this attack include: Apache 1.x, Apache 2.x, dhttpd, and GoAhead WebServer. (

Please Login HERE or Register HERE to see this link!

, 2011)

Regarding the Slowloris subject, an interesting case was the hunt of hacktivists participating in DDoS attacks on the U.S. Department of Justice, whitehouse.gov, and music label UMG. That happened immediately after the arrest of Kim Dotcom in January 2012. An unknown hacker succeeded in smuggling a Zeus trojan in a publicly available Slowloris tool. As a result, every hacktivist who downloaded the application had their own PC compromised. (Bangeman, 2012)


Other Tools
  • Dirt Jumper ??“ Method: HTTP flood, SYN flood, POST flood, and more.
  • Tor??™s Hammer ??“ Method: Slow POST
  • Nuclear DDoSer ??“ Method: Slowloris, Slow POST
  • Railgun ??“ Method: Slowloris or Slow POST

Conclusion

Just like how everything in this paper revolves around the number seven, this conclusion will provide seven basic things you should know about layer seven DDoS attacks:
  • They attack the top layer OSI model.
  • They have low bandwidth consumption.
  • They have a legitimate and stealth appearance.
  • They??™re mostly non-volumetric.
  • They??™re increasingly popular.
  • There are a variety of methods, targets, and open-source tools.
  • They??™re difficult to defend against.

401a3d5869.jpg

 

,,Der blaue Baum" von Prohex (2020)




  Thema Forum Themenstarter Statistik Letzter Beitrag

Besucher die dieses Thema lesen:

Mitglieder: , Gäste: , unsichtbare Mitglieder:


This topic has been visited by 78 user(s)


    , _)_, 133TFoX, Akaja, alexwd, Anonyy, ASpirit123, b11-87, BioLord2013, biosmanp, Blackhook, Bloodman, Blower, blue_eyed_devil, BobbyRango, BobMarley, Breezer, ByteLSX, C64, Ch!ller, Chiefkiller, confick.ini, Cube, DarkICE, DirtyGirl, DramaModz691, easysurfer, Emalik Xantier, Framerater, frezze, GeraxY, gravel, Grisu, H0M3R5, hackeris, hunny5142, HyperG192, iLiiX, Izon, Janjij, jnxz, Kaju, King of America, LastKingz, leveryy, lgx, lion., lowbob, macinchris, MiD_NiGHT, mking1226, MoOe, MuesliChabo, N0V3, Naws, nibble nibble, nWostealer, PaulaAbdul, paulaner, pericastevica, ra1ner, Ricated, Rudgen, S1lent, s2lent, Samrock, smc2014, sqiNNi, Strike320, summo, tianchrispro, tourett, Tron, tschilben, Tw0F1sh, White-Warti, Xenio, xsamix
Die besten Hacking Tools zum downloaden : Released, Leaked, Cracked. Größte deutschsprachige Hacker Sammlung.