Chapter 16. Denial-of-Service Attacks

In this chapter you’ll learn about denial-of-service (DoS) attacks, how they work, their history, targets, and programs used to launch them.

What Is Denial of Service?

Denial of service is the category of attacks that cause a loss of service or an inability to function. They come in many forms and strike many different targets. The results can last for minutes, hours, or days, and can impact network performance, data integrity, and system operation.

The first DoS attack of significance was the Morris Worm, estimated to have taken some 5,000 machines out of commission for several hours. At the time (November 1988), it was a disaster for academic and research centers, but had little impact on the rest of the world. Today, comparable DoS attacks, such as those against Yahoo!, Amazon, and other major Web sites in February 2000, have resulted in millions of dollars in lost business and revenue. The frequency of DoS attacks is increasing at an alarming rate, due in part to the prevalence of tools written for this purpose. The complexity of the attacks is also being taken to new levels, which mandates the need for stringent security practices and the implementation of new protection mechanisms.

Many denial-of-service tools are written as proof-of-concept code. The purpose is to demonstrate insecurities within common operating systems, such as Windows, Linux, Solaris, and the BSD-derived Unixes. The Morris Worm was an experiment in distributed computing, albeit a little forcefully done. Poor development practices and a failure to introduce security early into new applications and operating systems cause many of these exploitable problems to exist. The growing complexity of network design and organization pushes the limits of current technology and exacerbates new vulnerabilities. The presence of denial-of-service attacks is a double-edged sword. On the one hand, it is unfortunate that conditions exist that allow denial-of-service techniques to proliferate. On the other, its presence is part of the technology evolution that generates higher-security products and applications.

The standard for security has risen greatly, and this is apparent with the reaction to DoS attacks. Only recently have we seen legislation that deals with this form of attack. It is no longer considered a silly prank when revenue is lost in our Internet-driven economy.

NOTE

It should be noted that sometimes denial of service is not the result of an attack. On September 11, 2001, most of the major news sites, such as CNN, were unavailable. The reason was that they simply had too many people trying to read the news—the sites did not have the resources available to handle such an unexpectedly heavy load.

How Denial of Service Works

Denial-of-service attacks are generally pulled off by exploiting programming flaws in software and by writing specialized programs whose purpose is to perform attacks. DoS attacks generally work in one of the following ways:

  • Bandwidth consumption

  • Resource saturation

  • System and application crash

Bandwidth consumption is an attack against network resources, and refers to the complete use of available network bandwidth by an attacking computer or computers. This makes network response slow or stops the server completely while the attack is ongoing, and causes an inability to reach services such as Web sites, email, and files. Resource saturation targets specific computer systems that provide services such as Web access, email, DNS, and FTP, and causes them to slow or halt. System and application crashes result in denial of service, as the particular system or software freezes or crashes.

Bandwidth Consumption

Each network can support only a finite amount of network traffic at one time, and this amount is dependent upon a few factors: network speed, equipment types, and their performance. Common communication types of links from an ISP to an organization are ISDN, DSL, broadband (using cable modems), T1, and T3. These link types also reflect different bandwidth capabilities. Common Local Area Network (LAN) topologies use 10BASE-T and 100BASE-T. For further information about network bandwidth and speeds, see http://www.speedguide.net/Cable_modems/bandwidth.shtml.

Denial of service by bandwidth consumption occurs when the entire capacity of the network link is used. When the network bandwidth capacity is reached, new network data cannot be sent. This means new connections to the Internet, file servers, Web servers, email servers, or any other function that requires network communication will not work. Connections that are already established will slow to a crawl, freeze, or be disconnected.

Attacks against bandwidth can occur via specialized attack programs and the misconfiguration of network equipment. The programs used to cause denial of service are discussed later in this chapter in the section “Recent DoS Attacks.” Misconfiguration of network equipment includes any device that connects to the network, such as computer systems, routers, switches, and other devices.

Bandwidth attacks are active; the denial of service occurs only as long as the bandwidth is used fully. As soon as the attacking program stops sending data, or the device is configured properly, bandwidth again becomes available. Most network functionality will return to normal, except for a few connections that might need restarting.

Common attacks include protocol-based exploits that consume network bandwidth by sending crafted network data. The access device, such as a router, can fail as it becomes inundated with more traffic than it can process. Another form of bandwidth attack relies on the reaction of network-connected systems and devices to specific network data. Many or all of the computers on the target network can be made to respond simultaneously to network traffic, such as IP broadcasts (IP packets that are sent to the broadcast address of a network instead of to a specific machine), thereby consuming all of the available bandwidth. The “Smurf” attack is one popular example of this form of attack. This and other forms are outlined in the section “Recent DoS Attacks.”

Resource Saturation

Like a network, each computer system also has a finite set of resources, including memory, storage, and processor capacities. Resource saturation is when all of one or more of these resources is used up, which leaves nothing for other applications. The SYN flood is a popular example of an attack that uses all the available networking resources on a system.

Each operating system that supports TCP/IP network connectivity has limitations on the number of connections that can be maintained at one time. The SYN flood exploits the three-way handshake of a TCP connection, which is outlined in Chapter 6, “A Brief TCP/IP Primer.” The SYN flood succeeds by creating “half-open” connections on the port on the target server. Half-open connections are those in which the three-way handshake is not completed. Normally, the handshake completes or times out, causing the connection to be deleted. Each port can only support a finite number of half-open connections, and when this number is exceeded, no other new connections can be made. By sending only the first packet of the TCP handshake with invalid or spoofed source addresses, the server responds to the SYN packet with an acknowledgment. Because this acknowledgment goes to a falsified address, the response to it never arrives. This causes a backlog of half-open connections that are waiting to be completed, preventing new connections from being accepted.

The Web server is a good sample target for a denial-of-service attack, although any network service can be targeted. As we have all probably experienced, a busy Web server tends to respond more slowly to our requests. A bit of knowledge about TCP/IP and the Hypertext Transfer Protocol (HTTP) is needed to understand how these attacks work. A single HTTP request and connection is made when the browser connects to the Web server. This request asks the server for a particular file; the server then sends the file, and the connection is closed. Under these circumstances, a Web server can handle a large number of requests because the requests usually take a very short time to complete, and they arrive one after another. As the server receives more simultaneous requests, the application becomes loaded as it processes all of these connections at the same time. Even with this slowdown, the Web server can still function.

To cause the Web server to stop functioning, the attacker needs to increase the time needed to handle these connections, or increase the processing power needed to handle each one. A SYN flood against a Web server makes the server unable to accept new connections by exceeding the maximum number of connections for the port it uses. The SYN flood is difficult to defend against. If the attacker forges packets to look as if they are coming from an unreachable system, the server has no way of knowing that they are not typical traffic. The server then responds as it would to any other connection, and waits for a timeout to occur before it realizes it should close the connection. As outlined in the SYN flood description above, the denial of service occurs when the Web server receives a large number of these forged packets—so many that it cannot handle any more new connections—and is inevitably stuck waiting for these falsified connections to timeout before it can continue processing. Similar attacks are the ICMP flood and the UDP flood, which use other protocols to achieve the same effect.

Another example of resource saturation can occur with the use of external programs such as Common Gateway Interface (CGI) programs with the Web server. Programs that store data in files on the Web server can be exploited to fill the hard disk on the server. The server operating system uses files for much of its normal functionality, and when full, it can often fail to function. Similarly, applications that allocate a lot of memory or require a lot of processing power for complex computations can be exploited to use all of those resources, preventing new processes and applications from functioning. These attacks are not exploitable only via the Web server—any access to the system might allow an attack to succeed. The email bomb discussed in the “Exploitation and Denial of Service” section is a good example of this.

System and Application Crash

System and application crashes are fast and easy approaches to denial of service, wherein a programming flaw is exploitable and causes the application or operating system to crash. A well-known example of these crashes is the “Ping of Death” attack, which uses oversized ICMP echo requests. The target machine crashes due to improperly implemented handling of this type of network data.

These attacks are also commonly directed against network access devices such as IP routers, cable routers, managed Ethernet switches, VPNs, and other application-specific devices. These devices often support some form of management interface including a Command Line Interface (CLI) and a Web management interface. Through various methods, including a large number of simultaneous connections, buffer overflows in user input routines, and improper data validation, these devices have been made to crash. A denial-of-service attack on an access device has a wider influence than an attack on a single machine, because these devices are typically gateways to multiple networks.

Many of these attacks can be prevented by the safe configuration of the network device. This includes changing factory-set default passwords, setting IP filtering, and configuring the device to allow management from only a select group of machines.

Exploitation and Denial of Service

This section outlines common attacks through the denial-of-service methods outlined in the previous section:

  • Email bomb resource attacks

  • Protocol attacks

Email Bomb Resource Attacks

Email bombs are insidious attack methods that make up for simplicity with their effects. A traditional email bomb is simply a series of messages (perhaps thousands) sent to your mailbox. The attacker’s objective is to fill your mailbox with junk, or to fill the hard disk or file system on which the mail server runs with junk. If mailbox quotas are used, the receiver of an email bomb cannot receive new messages until the mailbox is cleaned up. If the file system of the mail server is full, no other users can receive new messages. Email bombs lead to the loss of important data, along with increased bandwidth and resource usage, which can translate into higher network charges. If you use a dial-up connection, this can also translate into increased connection charges and wasted time.

Email Bomb Packages

Email bomb packages are programs that automate the process of email-bombing someone. System administrators should be aware of these packages and the filenames associated with them. (Although this knowledge will not prevent your system from being attacked, it might prevent your users from attacking other systems.)

Table 16.1 lists the most popular email bomb packages and filenames associated with them. If you run a network with multiple users, you should scan your drives for those filenames.

Table 16.1. Common Email Bomb Packages and Associated Filenames

Bombing Package

Filenames

Aenima

aenima17.zip, aenima20.zip

Avalanche

alanch3.zip, alanch35b.zip, ava.zip, avalance.zip

Euthanasia

euthan15.zip, et15.zip

Gatemail

gatemail.c

Ghost Mail

gm51.zip

HakTek

hatetuk.zip

Kaboom

kaboom3.zip, kab3.zip

Serpent (Linux)

serpent.zip

The Unabomber

unabomb.zip, unz.zip

UNIX Mailbomber

mailbomb.c

Up Yours

upyours3.zip, up4beta3.zip

The Windows Email Bomber

bomb02b.zip

Many of these files can be found at http://home.cyberarmy.com/hackshock/bomber.htm.

Dealing with Email Bombs

Kill files, exclusionary schemes, or mail filters are all cures for an email bomb. Using these tools, you can automatically reject mail sent from the source address. There are various ways to implement such an exclusionary scheme. Unix users can find a variety of sources online.

If you use Windows or Mac OS instead, I would recommend any of the mail filter applications listed in Table 16.2. Many of these are shareware, so you can try them before you buy them.

Table 16.2. Popular Mail Server Filter Applications and Their Locations

Filter Package

Location

EIMS(MacOS)

http://www.eudora.com/

E-Mail Chomper (Win95/98/NT)

http://www.sarum.com/echomp.html

Mail Siphon (MacOS)

http://www.maliasoft.com/siphon/

Musashi (PPC, MacOS)

http://www.sonosoft.com/

SIMS (MacOS)

http://www.stalker.com/

Spam Buster (Win 9x/ME/NT/2000/XP)

http://www.contactplus.com/

SpamKiller (Win 9x/NT/ME/2000/XP)

http://www.spamkiller.com/

In addition to these packages, you can use the filtering capabilities built into most of the major email packages. You can add filters based on keywords such as “Viagra” that appear in a lot of spam, or you can reject particular senders.

If someone starts bombing you, you can also try a human approach by contacting the attacker’s postmaster. This is generally effective; the user will be counseled that this behavior is unnecessary and will not be tolerated. In most cases, this proves to be a sufficient deterrent. Some providers have strong appropriate usage policies and will immediately terminate the user’s account if it is used inappropriately.

Lastly, know this: Not all ISPs are responsible. Some of them might not care whether their users are email-bombing others. If you encounter this situation, you don’t have many choices. The easiest cure is to disallow any traffic from their entire domain.

Email Bombs as Security Risks

In many circumstances, email bombs can result in denial of service. For example, one individual bombed Monmouth University in New Jersey so aggressively that the mail server temporarily died. This resulted in an FBI investigation, and the young man was arrested.

NOTE

Most mail packages will die given the right circumstances on the right platform. For example, one of my clients found that directing a 40MB mail message to mailserv on UnixWare will kill the entire box. The freeze is unrecoverable except via reboot, and reboot is no recovery at all. There is no fix for this.

If you experience this level of attack, you should contact the authorities, especially when the attacker varies his origin, thus bypassing mail filters or exclusionary schemes at the router level. Chances are, if the attack is that persistent, your only remedy is to bring in the police.

Email Bombing Viruses

The recent trend towards email-based viruses also presents a denial-of-service condition. The automation and integration of newer applications allows greater flexibility and increased functionality, but also presents security risks if not used appropriately. Windows-based macro and Visual Basic Script (VBS) viruses demonstrate this clearly. The VBS.LoveLetter, “I Love You” and “Anna Kournikova” viruses, and the Klez and VBS.SST worms show the fine line between viruses and denial of service. All of these viruses exploit the capabilities of Microsoft’s Outlook mail client to automatically execute executable code contained in messages. The virus code replicates and sends itself to many other recipients, magnifying the problem and resulting in widespread infection and loss of service as files are deleted and mail servers cease functioning. Disabling Windows Scripting Host can help alleviate the problem of automatic execution. See http://www.sophos.com/support/faqs/wsh.html for further information.

List Linking

List-linking attacks have similar effects to email bombs, but their appearance is more inconspicuously malignant. In list linking, the target subscribes you to dozens of mailing lists, which can fill your mailbox and possibly the mail server with data.

NOTE

Mailing lists distribute mail messages collected from various sources. These messages typically concentrate on a special interest subject. These mail servers (sometimes called list servers) collect such messages and mail them to members of the list on a daily, weekly, or monthly basis. Members can subscribe to such a list in several ways, though most commonly through email.

Mail-bombing packages automate the process of list linking. For example, Kaboom and Avalanche are two well-known email bomb packages that offer point-and-click list linking. The results of such linking can be disastrous. Most mailing lists generate at least 50 mail messages daily, and some of those include binary attachments. If the attacker links you to 100 lists, you will receive 5,000 email messages per day. Furthermore, you must manually unsubscribe from each mailing list once you are linked. Moreover, attackers often choose times when you are known to be away, such as when you are on vacation. Thus, while you are absent, thousands of messages accrue in your mailbox. This can amount to a denial-of-service attack, particularly if your system administrator puts quotas on mailboxes.

List linking is particularly insidious because a simple mail filter doesn’t really solve the problem—it just sweeps it under the rug. Here’s why: The mail keeps coming until you unsubscribe from the lists. In fact, it will generally keep coming for a minimum of six months. Some mailing lists request that you renew your membership every six months or after some other specified period of time. This typically entails sending a confirmation message to the list server. In such a message, you request an additional six months of membership. Naturally, if you fail to provide such a confirmation message, you will eventually be taken off the list. However, in this scenario, your first opportunity to get off the list will not occur for six months. Therefore, no matter how irritating it might be, you should always deal with list linking immediately.

The cure for list linking is to unsubscribe from all lists you have been linked to. Doing this is more difficult than it sounds for a variety of reasons. One reason is that new lists seldom include instructions to unsubscribe. Therefore, you might be forced to trace down that information on the Web. If so, expect several hours of downtime.

TIP

To help fight against list linking, most mailing list administration software requires confirmation of subscriptions and also provides passwords for list members. These passwords are used to modify the user’s subscription information and provide authentication. It is useful to keep copies of the initial subscription messages after signing on to a mailing list. These informational messages are invaluable, and often contain the pertinent information needed to unsubscribe and maintain list membership.

Your ability to quickly and effectively unsubscribe from all lists will also depend largely on your email package. If your email client has powerful search functions that allow you to scan subject and sender headings, you can gather the list server addresses very quickly. However, if you use an email client that has no extended search functions, you are facing an uphill battle. If you are currently in this situation and have been list linked, communication with the maintainer of the list is often useful. Most mailing lists function by programs that automate most of the functionality the list provides. Contact with a real person is vital in the event of list linking. Should all attempts to unsubscribe fail, the user can implement permanent mail filtering, or, in the worst case scenario, a new email address might be warranted.

A Word About Mail Relay

Another issue related to mail bombing and list linking, as well as the overall presence of unsolicited commercial email (UCE) or spam, is the capability of the attacker to relay mail. In order to obscure their identity, most mail bombs arrive from fictitious users. The attacker’s capability to falsify his identity arises from the configuration of various ISPs’ mail servers. Mail relaying allows a mail server to be used to send mail to foreign networks.

As part of the transaction for sending a mail message, the software used to send mail connects to the mail server. The recipient’s address and the sender’s address are specified, and the message is then transmitted. Mail relaying occurs when either the sender’s address or the system from which the sender connects to the server is not on the same network as the server. Mail servers that are configured to allow relaying allow foreign users and systems to send mail to any other user. Servers that are configured to disallow relaying will not allow messages with sender addresses on unknown networks, or from systems on those networks.

In general, mail relaying is seen as a security risk and is disabled. For those systems that allow relaying, little can be done to prevent its misuse. Filtering packages are incapable of supplying the needed security. Filtering by domain name or IP addresses might disallow legitimate email from being sent—this is not the desired outcome. For example, filtering to stop UCE from AOL will likely disallow millions of users’ email from being delivered.

The issue of mail relaying is complex, because messages such as mail bombs and UCE are syntactically the same as legitimate mail messages. Therefore, it is important to be aware of this issue as it relates to denial of service because it is one piece of the prevention puzzle.

Mail Relaying Blocking Lists

A variety of mail relaying blocking systems exist. Distributed Sender Boycott List (DSBL, http://dsbl.org/, formerly ORBZ), Mail Abuse Prevention System (MAPS, http://www.mail-abuse.org/), Relay Stop List (RSL, http://relays.visi.com/), and Open Relay DataBase (ORDB, http://www.ordb.org/) are a few. They work by compiling a list of sites they believe spammers can use to relay mail. They then recommend that you block any email coming from these sites to stop spam.

Unfortunately, this is a case where the solution may be just as bad or worse than the original problem. First of all, some of the lists have been called “personal vendetta lists.” Apparently, some sites have been listed that should not have been, and some of these sites have even sued (see http://www.stoporbs.org/ for more information). Also, take a look at the FAQs for a couple of blocking lists: http://relays.osirusoft.com/faq.html and http://www.dorkslayers.com/faq.html. Honestly, after reading these, there is no way I’d trust these lists as being rational in their decisions.

Although these lists’ purpose is to prevent denial of service from spammers, they create a whole new denial of service where you can’t get mail to and from legitimate contacts. Businesses need to be especially careful in using such a list, because when their customers can no longer send them email, they are likely to take their business elsewhere. Crackers who want to cause problems for an entire site can work at getting the site listed on one of these lists.

Protocol Attacks

Attacks against network protocols make up a large portion of the DoS attacks that occur. Protocol attacks result in bandwidth consumption, system crashes, and resource saturation, causing denial-of-service conditions. These attacks are very threatening, and can stop network connectivity and system functionality for an indeterminate amount of time. Prevention of protocol attacks also requires considerably more advanced and complex procedures and countermeasures.

Protocol attacks strike at the heart of IP implementations. Hence, they can crop up on any platform. Worse still, because IP implementations are not drastically different from platform to platform, a single DoS attack might well work on several target operating systems. A well-known example of this is the LAND attack, which could incapacitate almost two dozen different operating systems, including Windows NT and a slew of Unix flavors. Other examples include the previously mentioned SYN, UDP, and ICMP flood attacks.

Furthermore, analysis of DoS code releases consistently shows that when a new attack is out, it will eventually work on nearly all platforms, even if it doesn’t initially. New strains of DoS attacks are released about every two weeks or so. Such releases are typically written on a single build platform (Linux, for example) to attack a single target platform (Windows NT, for example). After such code is released, it is examined by the hacker and cracker communities. Within days, someone releases a modified version (a mutation) that can incapacitate a wider variety of operating systems.

The “Ping of Death,” SYN flood, and some other attacks should sound familiar by now. These protocol attacks rely on the continued existence and use of these common protocols. Their effects are widespread because of the prevalence of vulnerable operating systems and network equipment. New methods to prevent and defend against exploitation at this basic level have arisen. These methods are outlined in the DoS attack index that follows.

Denial-of-Service Attack Index

Here is a comprehensive index of recent and old DoS attacks; each is fully documented. The fields provided and their significance are as follows:

  • Filename—The filename provided is the one by which the attack is most well-known. However, as folks distribute exploit code (programs that make an attack), different people name the file different things. There are various reasons for this, but the most common is to obscure the exploit code from system administrators. Since system administrators generally know the filenames of such tools, crackers rename them.

  • Author—In this field, you often see aliases or email addresses instead of real names. In the index, I have made every good faith effort to obtain the name, email address, or alias of each program’s original author. If you authored one of the following programs and credit has erroneously been given to some other party, please contact Sams and let them know.

  • Location—This is the location of the source code for the exploit code. From this URL, you can download the source code and test it on your own machine.

  • Background—The Background field denotes locations where further documentation can be found. This usually points to an article or mailing list posting that details the attack’s chief characteristics.

  • Build Operating System—This field indicates either what platform the attack code was written on, or which operating system will successfully run the code.

  • Target Operating System—This field indicates what platform can be successfully attacked using the source code found at the Location.

  • Impact—This field briefly describes the effect of an attack using the source code.

  • Fix—This field points to URLs that hold patches or workarounds.

Recent DoS Attacks

If you want to stay up-to-date with the latest attacks, go to http://www.packetstormsecurity.com/ and look at the “last 20 exploits” list.

BIND

Smurf

  • Filename: smurf.c

  • Author: TFreak

  • Location: http://www.packetstormsecurity.com and search for “smurf”

  • Background: http://www.cert.org/advisories/CA-1998-01.html

  • Build Operating System: Unix

  • Target Operating System: Any system that responds to ICMP data.

  • Impact: Causes denial of service via spoofed ICMP echo requests to a network broadcast address.

  • Fix: Disable IP directed broadcasts on the router and configure operating systems not to respond to packets sent to IP broadcast addresses.

Fraggle

  • Filename: fraggle.c

  • Author: TFreak

  • Location: http://www.packetstormsecurity.com and search for “fraggle”

  • Background: Smurf with a UDP twist; see the previous entry

  • Build Operating System: Unix

  • Target Operating System: Any system that responds to UDP data.

  • Impact: Causes denial of service by making systems send UDP network data to a spoofed target.

  • Fix: Disallow unused ports on the firewall and configure network equipment and operating systems not to respond to UDP broadcasts.

The following flood attacks are general mechanisms that are still common today, although the technology has been available for quite some time.

ICMP Flood

SYN Flood

UDP Flood

Historical List of Well-Known DoS Attacks

The following attacks are early, well-known and well-documented DoS attacks. The vulnerabilities allowing most of these attacks to succeed have been solved in newer versions of operating systems, but many organizations still have older and unpatched systems around. If you are responsible for securing a network, make sure you cover these bases. Fixes are available for all of these attacks, and should be understood and implemented. Take a moment now to run through the following attacks to see if you’re vulnerable. Most are easily fixed.

For more information about past and present DoS attacks organized by operating system, software and device, see “The DoS Database” at http://www.attrition.org/security/denial/.

Teardrop

Teardrop was an early DoS attack that spawned several variants. This set the stage for many new DoS attacks and approaches to DoS tool creation.

Bonk/Boink Attacks

  • Filename: bonk.c, boink.c

  • Author: The people at Rootshell.com

  • Location: http://www.packetstormsecurity.com/ and search for “bonk” or “boink”

  • Background: See source code

  • Build Operating System: Unix

  • Target Operating System: Windows 95 and Windows NT. Patched and later versions are unaffected.

  • Impact: This utility will crash any Windows 95 or NT box, and it is basically a modified version of code previously written by . The malformed packet has a fragment offset that is greater than the header length.

Jolt2

LAND

The LAND attack sent tremors through the Internet community, primarily because of the sheer number of systems affected. In particular, it was learned that certain network hardware was also vulnerable to the attack, including routers.

NOTE

Only certain hardware was vulnerable to LAND. It is known that NCD X Terminals, Catalyst LAN switches (Series 5000 and Series 2900), and Cisco IOS/700 were all vulnerable. If you fear that your router is vulnerable, I suggest compiling and using land.c as a test.

You should contact your vendor regarding fixes. It can take time to route out all LAND variations because so many mutations have cropped up. One version crashes Windows 95 and NT, even with Service Pack 3 installed. Windows NT is currently up to Service Pack 6a. If your systems are current, this attack does not pose a threat. Workarounds for Cisco hardware can be found at http://www.securityfocus.com. Otherwise, contact your respective vendor.

If your operating system is Windows 95, get the patch for the original LAND attack as well as several mutations. That patch can be found by searching for “land” under the Windows 95 knowledge base at http://support.microsoft.com/.

Winnuke

  • Filename: winnuke.c

  • Author: _eci

  • Location: http://www.packetstormsecurity.com and search for “nuke”

  • Background: See the below description

  • Build Operating System: Linux, BSDI

  • Target Operating System: Windows 95 and Windows NT. 98/2000 are not affected.

  • Impact: Windows 95 and NT failed to react properly to packets with the out-of-band (OOB) flag set. Often caused a system panic requiring reboot.

  • Fix: http://support.microsoft.com/

Winnuke will kill any unpatched Windows 95 or Windows NT box, forcing a reboot. This attack has gone through several mutations and is available for many build operating systems. The “nukenabber” tool helps to identify the presence of this tool on a network.

Nukenabber is a small, compact port sniffer written by . The program listens on ports 139, 138, 137, 129, and 53. These are all ports on which DoS attacks have been implemented in the past. Nukenabber notifies you when your machine is under Winnuke attack. The program is available at http://www.dynamsol.com/puppet/nukenabber.html.

DNSKiller

  • Filename: winnuke.c

  • Author: _eci

  • Location: http://www.packetstormsecurity.com and search for “DNSKiller”

  • Background: See the below description.

  • Build Operating System: Linux, BSDI

  • Target Operating System: Windows NT.

  • Impact: Crashes DNS server, which can lead to other machines being unable to use Internet domain names correctly.

  • Fix: http://support.microsoft.com/

DNSKiller will kill a Windows NT 4.0 box’s DNS server. The source code was written for a Linux environment. However, it can also run well on BSD-ish platforms. For more information, see http://archives.neohapsis.com/archives/bugtraq/1997_1/0152.html.

arnudp100.c

  • Filename: arnudp100.c

  • Author: _eci

  • Location: http://www.packetstormsecurity.com and search for “arnudp100.c”

  • Background: See the below description.

  • Build Operating System: Linux, Solaris, FreeBSD, Novell

  • Target Operating System: Old versions of Linux, Solaris, and FreeBSD. Does affect Netware 4 and 5, however.

  • Impact: Worst case is that it can crash a system.

  • Fix: Upgrade OS

arnudp100.c is a program that forges UDP packets, and can be used to implement a DoS attack on UDP ports 7, 13, 19, and 37. To understand the attack, I recommend examining “Defining Strategies to Protect Against UDP Diagnostic Port Denial-of-Service Attacks,” by Cisco Systems. Another good source for this information is CERT Advisory CA-96.01.

NOTE

Cisco Systems’ “Defining Strategies to Protect Against UDP Diagnostic Port Denial-of-Service Attacks” can be found online at http://cio.cisco.com/warp/public/707/3.html.

Distributed Denial-of-Service Attacks

In early 2000, the Internet community saw a new method of attack unleashed upon several popular Web sites, including CNN, E*Trade, Datek, Amazon.com, Yahoo!, and Buy.com that caused them to be unreachable for several hours. These attacks were unlike normal DoS attacks in that the flood of network traffic appeared to come from many different systems simultaneously. Network administrators and security personnel scrambled to identify the causes and sources of the attacks, as well as to find methods to stop them and bring their crawling Web sites back into service. Rumors spread about a coordinated underground cracking community conspiring to attack simultaneously. It appeared as though a new form of attack—the distributed denial-of-service (DDoS) attack—had arrived, and that it would become a nightmare for Web sites and businesses.

The good news is that over the past two years these attacks have not become as common as once feared. They do still occur every now and then. However, there have been relatively few new techniques, and many security products are now designed to deal with them. Administrators are also more aware of the attack methods, and are better prepared to defend against them.

Distributed denial-of-service attacks, as the name implies, occur when several systems, from a handful to thousands, simultaneously attack a specified target. Some of the well-known and analyzed attack forms are Trinoo (or Trin00), Tribe Flood Network (TFN), TFN2k (an updated version of TFN), and Stacheldraht (German for “barbed wire”).

These attacks function via a master and slave mechanism. The master is the controlling station where the attacker defines the target and method of attack. The slave stations are remote systems that have been compromised and have had the attack tool installed. The master signals the slave stations to launch the attack. The attack is also stopped by another signal from the master system.

A good general overview of DDoS attacks can be found in “Distributed Denial-of-Service Attacks” by Bennett Todd at http://www.linuxsecurity.com/resource_files/intrusion_detection/ddos-faq.html.

This section provides an index of DDoS attack tools. The background information includes full analyses of the attack methods and source code.

Trinoo (Trin00)

Tribe Flood Network (TFN)

TFN2k

Stacheldraht

Summary

Denial-of-service attacks represent a growing trend in hostile Internet activity. After a few years of new techniques appearing for making DoS attacks, the past two years have been relatively mild in comparison. The care and diligence used to design and implement networks, software, and operating systems has a great effect on the ability of the attacker to cause denial of service. Prevention and awareness are two factors that have an immediate impact on the success of these attacks. Filtering unnecessary services and network data, stronger authentication and access control of remote systems and users, and the proactive monitoring and updating of systems and software can help protect your network against these attacks.

Other DoS Resources

Finally, here are several useful links for further information on DoS attacks.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.53.93