Hakin9 Magazine 02/2013
Total Page:16
File Type:pdf, Size:1020Kb
PRACTICAL PROTECTION IT SECURITY MAGAZINE Dear Hakin9 Readers, his month’s issue is devoted to DDoS Attacks. We prepared T some articles written by experts who face these problems every day. team Editor in Chief: Oleksandr Bevz Janice Camacho and Josh Day discuss the business impact [email protected] of DDoS and the loss it causes. Elizabeth Botes shares her Editorial Advisory Board: John Webb, Marco long-time experience in this field with you too. Gur Shatz men- Hermans, Gareth Watters tiones five golden rules to avoid DDoS attacks. Correro’s Secu- Proofreaders: Jeff Smith, Oleksandr Bevz, Krzysztof rity Evangelist, Stephen Gates, advises what kind of system is Samborski most effective in preventing today’s DDoS attacks. Sergey Shekyan presents his SlowHTTPTest, a tool that Special Thanks to the Beta testers and Proofreaders who helped us with this issue. Without their assistance tests DdoS attacks. there would not be a Hakin9 magazine. Passing to the practical articles, Orlando Pivi explains how Senior Consultant/Publisher: Paweł Marciniak to check if your computer is infected and how to deal with it. Sahil Khan shows how to gather information from website and CEO: Ewa Dudzic [email protected] from Large Computer Network with simple DOS Command. Hakin9’s Editorial Team would like to give special thanks to Product Manager: Krzysztof Samborski the authors, betatesters and proofreaders. [email protected] We hope you enjoy reading this issue and find its content Production Director: Andrzej Kuca both informative and interesting. [email protected] DTP: Ireneusz Pogroszewski Art Director: Ireneusz Pogroszewski Oleksandr Bevz [email protected] Hakin9 Editor and Hakin9 team Publisher: Software Press Sp. z o.o. SK 02-682 Warszawa, ul. Bokserska 1 Phone: 1 917 338 3631 www.hakin9.org/en Whilst every effort has been made to ensure the highest quality of the magazine, the editors make no warranty, expressed or implied, concerning the results of the content’s usage. All trademarks presented in the magazine were used for informative purposes only. All rights to trade marks presented in the magazine are reserved by the companies which own them. DISCLAIMER! The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. 4 02/2013 CONTENTS DDOS AS A Threat to BUSINESS Stimulating Application Layer Denial of Why DDoS Attacks Are Service attacks with SlowHTTPTest 20 a Threat You Can’t Afford to Ignore? 06 By Sergey Shekyan By Janice Camacho & Josh Day Slow HTTP attacks are denial-of-service (DoS) attacks Distributed Denial of Service (DDoS) attacks no longer that rely on the fact that the HTTP protocol, by design, occur on a small-scale basis: they are now classified requires a request to be completely received by the as “cybercriminal” activity, especially because today’s server before it is processed. If an HTTP request is not hackers have managed to take down well-known global complete, or if the transfer rate is very low, the server corporations. Many DDoS attacks still continue to by- keeps its resources busy waiting for the rest of the data. pass some of the strongest barriers, making no place on the Internet safe. STEP BY STEP WITH DOS AND DDOS How to Combat Email-Based Threats (D)DOS: Practical Approach 22 to Business Continuity with By Dario Ursomando and Emanuele De Lucia Trusted Sender Recognition? 12 During the last years with the advance of information By Elizabeth Botes and communication technologies, our societies are Though mature and capable, the spam filters and an- evolving into global information societies. This brought ti-virus solutions that organizations currently rely on in a constant computing environment that has made cy- to counter email-based threats are quite simply not ber attacks significantly more sophisticated and threat- enough as new threats emerge. These threats can – ening. With the technologies falling prices and with the and do – result in the theft of intellectual property, large subsequent growth of internet access is becoming eas- sums of money being stolen and other serious disrup- ier and more profitable for criminal organizations or for tions that can significantly impact both day-to-day and the single vandal launch attacks against governments long-term business operations. and commercial organizations. The DDoS Protection Jungle – The Five How to Understand that Golden Commandments 16 Your PC Is Infected? 38 By Gur Shatz By Orlando Pivi DDoS is not a theoretical threat but something busi- In this article you will learn how to control and secure a nesses and organizations deal with every day. DDoS is computer that can be infected by a virus or in general by different because it involves real people trying to take malicious software or unwanted software (PUA – PUP*). down your site, using their wits and tools to overcome You will have also a general idea of how to determine if every protection layer. This has pushed vendors to the a file is safe or not, manually and automatically, and you limits of their creativity. The good thing is that there are will learn also how to do to find what a specific file does good solutions and ideas out there. The bad news is to the system. Balanced the use of on-line services to that there are lots of different options and technologies create a simple guide understandable by all. Of course to pick from. Regardless of the type of solution that is the most accurate way is a total manual analysis but to best for you, to be effective, it should adhere to a set of understand it you should have some knowledge base. fundamental commandments. How to Gather Information with Ddos? 42 By Sahil Khan HAKIN9 EXTRA In this article you will learn how to gather information Interview with Stephen Gates 18 from websites and from large computer network, in dif- By Aimee Rhodes ferent environment, with simple DOS command. Stephen Gates, Corero’s key security evangelist, ex- Information Gathering is also used in Forensic Investi- plains what are the business impacts of DDoS and what gation in both way, web and network. defense systems he believes are capable to prevent the attacks. www.hakin9.org/en 5 DDOS AS A THREat TO BUSINESS Why DDoS Attacks Are a Threat You Can’t Afford to Ignore? Distributed Denial of Service (DDoS) attacks no longer occur on a small-scale basis: they are now classified as “cybercriminal” activity, especially because today’s hackers have managed to take down well-known global corporations. Many DDoS attacks still continue to bypass some of the strongest barriers, making no place on the Internet safe. Luckily, DDoS mitigation expert DDoS Defend is here to ensure your website’s protection. What you will learn… What you should know… • What is a typical DDoS Attack • Have general computer knowledge • What are the targets of the attacks • What damages are caused by the attacks hen the Internet was first created in 1969, for themselves, perfect their image, and maximize it was designed to be a system that sig- their sales, as long as they have the proper mar- W nificantly improved communication be- keting tactics. In fact, according to Moving Your tween four computers. Since then, it has expand- Business From the Real World to the Internet, by ed into a global phenomenon that connects almost Jane M. Dawson, businesses that choose to ex- two and a half billion people (30% of the world’s plore the options of the Internet find that new doors population) through networks. open to better business branding, effective adver- At present, we live in an age where Internet de- tising, community building, consumer education, pendency is at an all-time high. Internet users and profits. spend a total of 35 billion hours online per month But, reputation is everything. In order to build a shopping, paying bills, using social networks, vis- trusted brand, websites must offer security, espe- iting multi-media sites, sending emails, reading cially if they plan to be in possession of their cus- news, etc. Because of the popularity of existing tomers’ private data at any time. As it turns out, Internet businesses, more real-world business- more planning went into the connective aspect of es are launching websites in an effort to market the Internet as opposed to its security. The truth is themselves worldwide and improve their brand. that websites are anything but safe from viruses Research from the US Census Bureau shows that and other attacks that could cause massive down- 45% of small businesses have a website, with an- time, affect user privacy and interaction, and inter- other 13% planning to build one in the near future. fere with company earnings. Also, according to annual revenue reports, 45% of According to Ketki Aror and Krishan Kumar, au- businesses with a website brought in $100,000- thors of Impact Analysis of Recent DDoS Attacks, $500,000 in revenue; 49% brought in $500,000- “The Internet’s architecture is very open in nature; $999,000; 69% brought in $1,000,00-$2,490,000; any machine attached to it is publically visible to and 67% brought in $2,500,000-$4,500,000. In [other] machines attached to enable communi- May 2012, The Washington Business Journal re cation.” Because of the Internet’s openness, it is ported that more than 69% of small business own- easy for computers to be infected with viruses. As ers believed that mobile websites would be the key a precaution against catching and spreading vi- to their marketing growth over the next five years.