Lecture-13 Cyber Forensics - Denial of Service Investigation
Lecture-13 Cyber Forensics - Denial of Service Investigation
Denial Of Service(DOS):-
------------------------------------
A Denial of Service (DoS) is a type of attack on a service that disrupts its normal
function and prevents other users from accessing it. The most common target for a
DoS attack is an online service such as a website, though attacks can also be
launched against networks, machines or even a single program.
Link:- https://www.youtube.com/watch?v=xdd505iOmDg&ab_channel=Cloudflare
2. Protocol Attacks:-
----------------------------
Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and
more. This type of attack consumes actual server resources, or those of
intermediate communication equipment, such as firewalls and load balancers, and is
measured in packets per second (Pps).
Back-Chaining Propagation:-
-----------------------------------------
Back-Chaining Propagation requires attack toolkit installed on attacker's machine.
When an attacker exploits the vulnerable machine. It Opens the connection on
infected system listening for file transfer. Then the toolkit is copied from the
attacker. Once toolkit is installed on the infected system, it will search for
other vulnerable system and the process continues.
Autonomous Propagation:-
------------------------------------------
In this process the attacker exploits & send malicious code to the vulnerable
system. The toolkit is installed & search for other vulnerable systems. Unlike
Central Source Propagation, it does not require any Central Sourcce or planning
toolkit on own system.
#----------------------------------------------------------------------------------
--------------#
Machines:-
1. Attacker Machine:- Kali
2. Victim Machine:- Windows 7
Tools:-
-----------
1. Nmap
2. Metasploit
Commands:-
--------------------
#nmap -p 21 192.168.1.132
#msfconsole
#use auxiliary/dos/tcp/synflood
#show options
#set RHOST <victim ip address>
#set RPORT 21
#set SHOST <spoofable ip address>
#set TIMEOUT 30000
#exploit
Machines:-
1. Attacker Machine:- Kali
2. Victim Machine:- Windows 7
Tools:-
1. Hping3
Commands:-
--------------------
#hping3 <victim ip address> --flood
==>Open Victim Machine & Check/Observe the Utilities Performance Graph
==>Open wireshark and set TCP Packet Filter
#----------------------------------------------------------------------------------
--------------#
Link:- https://www.youtube.com/watch?v=OhA9PAfkJ10
Link:- https://www.youtube.com/watch?v=yLbC7G71IyE
On the other hand, distributed denial of service (DDoS) attacks are launched from
multiple connected devices that are distributed across the Internet. These multi-
person, multi-device barrages are generally harder to deflect, mostly due to the
sheer volume of devices involved. Unlike single-source DoS assaults, DDoS attacks
tend to target the network infrastructure in an attempt to saturate it with huge
volumes of traffic.
3. SYN Flood:-
-------------------
A SYN flood DDoS attack exploits a known weakness in the TCP connection sequence
(the “three-way handshake”), wherein a SYN request to initiate a TCP connection
with a host must be answered by a SYN-ACK response from that host, and then
confirmed by an ACK response from the requester. In a SYN flood scenario, the
requester sends multiple SYN requests, but either does not respond to the host’s
SYN-ACK response, or sends the SYN requests from a spoofed IP address. Either way,
the host system continues to wait for acknowledgement for each of the requests,
binding resources until no new connections can be made, and ultimately resulting in
denial of service.
4 .Ping of Death:-
-----------------------
A ping of death (“POD”) attack involves the attacker sending multiple malformed or
malicious pings to a computer. The maximum packet length of an IP packet (including
header) is 65,535 bytes. However, the Data Link Layer usually poses limits to the
maximum frame size – for example 1500 bytes over an Ethernet network. In this case,
a large IP packet is split across multiple IP packets (known as fragments), and the
recipient host reassembles the IP fragments into the complete packet. In a Ping of
Death scenario, following malicious manipulation of fragment content, the recipient
ends up with an IP packet which is larger than 65,535 bytes when reassembled. This
can overflow memory buffers allocated for the packet, causing denial of service for
legitimate packets.
<OR>
While some ping packets are very small, IP4 ping packets are much larger, and can
be as large as the maximum allowable packet size of 65,535 bytes. Some TCP/IP
systems were never designed to handle packets larger than the maximum, making them
vulnerable to packets above that size.
When a maliciously large packet is transmitted from the attacker to the target, the
packet becomes fragmented into segments, each of which is below the maximum size
limit. When the target machine attempts to put the pieces back together, the total
exceeds the size limit and a buffer overflow can occur, causing the target machine
to freeze, crash or reboot.
5. Slowloris:-
-------------------
Slowloris is a highly-targeted attack, enabling one web server to take down another
server, without affecting other services or ports on the target network. Slowloris
does this by holding as many connections to the target web server open for as long
as possible. It accomplishes this by creating connections to the target server, but
sending only a partial request. Slowloris constantly sends more HTTP headers, but
never completes a request. The targeted server keeps each of these false
connections open. This eventually overflows the maximum concurrent connection pool,
and leads to denial of additional connections from legitimate clients.
6. NTP Amplification:-
------------------------------
In NTP amplification attacks, the perpetrator exploits publically-accessible
Network Time Protocol (NTP) servers to overwhelm a targeted server with UDP
traffic. The attack is defined as an amplification assault because the query-to-
response ratio in such scenarios is anywhere between 1:20 and 1:200 or more. This
means that any attacker that obtains a list of open NTP servers (e.g., by a using
tool like Metasploit or data from the Open NTP Project) can easily generate a
devastating high-bandwidth, high-volume DDoS attack.
7. HTTP Flood:-
--------------------
In an HTTP flood DDoS attack, the attacker exploits seemingly-legitimate HTTP GET
or POST requests to attack a web server or application. HTTP floods do not use
malformed packets, spoofing or reflection techniques, and require less bandwidth
than other attacks to bring down the targeted site or server. The attack is most
effective when it forces the server or application to allocate the maximum
resources possible in response to every single request.
HPING 3:-
----------------- It is a network tool, which is used for crafting the packets,
testing the firewall, digital footprinting and much more.
#----------------------------------------------------------------------------------
--------------#
Sinkholing:-
------------------
Sinkholing is the redirection of traffic from its original destination to one
specified by the sinkhole owners. The altered destination is known as the sinkhole.
(The name is a reference to a physical sinkhole, into which items apparently
disappear.) Sinkholes can be used for good or ill intent.
Link:- https://www.youtube.com/watch?v=mf6OMPNfLN8
Link:- https://www.youtube.com/watch?v=yPNKQZar-Fw&ab_channel=HackerSploit
IP-based Prevention:-
--------------------------------
An intrusion prevention system (IPS) is a form of network security that works to
detect and prevent identified threats. Intrusion prevention systems continuously
monitor your network, looking for possible malicious incidents and capturing
information about them.