Wikileaks, Anonymous, and The Jester

Slides:



Advertisements
Similar presentations
Ethical Hacking: New Web 2.0 Attacks and Defenses HI-TEC 2011.
Advertisements

HiveMind Distributed File Storage Using JavaScript Botnets Copyright 2013 Sean T. Malone.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
1 쉽게 접근하자 DoS! Sookmyung Women’s Univ. 최서윤. 2 The DoS?! Sockstress DoS using LOIC Link Local DoS.
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Capacity Development Workshop on Public Information Management System and Policy in Korea on cyber attacks Jeong Min, Lee KISA.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Special Anatomy of an Attack Or Layered Security Failure.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Anonymous By Kendra Kennedy, Benjamin Fleshman, and Hassan Alsuleiman.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
E-Commerce Emilee King. Introduction Ecommerce.About.com defines e-commerce or electronic commerce as “Transacting or facilitating business on the Internet.
Introduction. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
The Security Circus.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
Computer Security By Duncan Hall.
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
The Security Circus MPICT Summer Conference, June, 2011.
The Security Circus CNIT 120 Jan 14, Linus Thorvalds.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
The Security Circus & DoS Attacks. Bio Summary The DoS Circus Layer 4 DDoS: Thousands of attackers bring down one site Layer 7 DoS: One attacker brings.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Internet Service Providers and types of internet connections
Chapter 40 Internet Security.
Hands-On Ethical Hacking and Network Defense
WannaCry/WannaCrypt Ransomware
Botnets A collection of compromised machines
Introduction to Information Security
WannaCry/WannaCrypt Ransomware
Go to youtube and search “Code.org internet videos”
DDoS Attacks on Financial Institutions Presentation
CONNECTING TO THE INTERNET
DDoS.
A Real and Rising Concern
The Hidden face of the Darknet
Speaker : YUN–KUAN,CHANG Date : 2009/11/17
Web Application Security - Web Application DDoS attacks are on the rise Kalle Bjorn Director, Systems Engineering Middle East.
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Web Server Protection against Application Layer DDoS Attacks using Machine Learning and Traffic Authentication Jema David Nidbwile*, Kazuya Okada**, Youki.
Sub-Saturating DDoS Attacks The Silent Bandwidth Thief
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Who should be responsible for risks to basic Internet infrastructure?
Botnets A collection of compromised machines
DRUPAL CON NASHVIllE 2018 DRUPALCON NASHVILLE.
Packet Sniffing.
National Incident Response Discussion Exercise
Network Security: IP Spoofing and Firewall
Hackers and Hacking George Pearson rev. 05/29/2018.
CS 2550 Foundations of Cybersecurity
Chapter 3. Basic Dynamic Analysis
What Makes a Network Vulnerable?
DoS is Over MPICT June 12, 2012.
DDoS Attack and Its Defense
Lesson 19 Internet Basics.
Outline Why is DDoS hard to handle?
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

Wikileaks, Anonymous, and The Jester The DoS Crisis Wikileaks, Anonymous, and The Jester

Animated Summary http://goo.gl/7k13D

Characters

Wikileaks Published <1000 US Gov't diplomatic cables from a leak of 250,000 Distributed an encrypted "Insurance" file by BitTorrent Widely assumed to contain the complete, uncensored leaked data Encrypted with AES-256--no one is ever getting in there without the key Key to be released if Assange is jailed or killed, but he is in a UK prison now and the key has not been released

Th3j35t3r "Hacktivist for Good" Claims to be ex-military Performs DoS attacks on Jihadist sites Brings them down for brief periods, such as 30 minutes Announces his attacks on Twitter, discusses them on a blog and live on irc.2600.net

Operation Payback 4chan's Anonymous group Attacked Scientology websites in 2008 Attacked the RIAA and other copyright defenders Using the Low Orbit Ion Cannon with HiveMind "Opt-in Botnet"

Distributed Denial of Service

Companies that Refused Service to Wikileaks Amazon Paypal Mastercard Visa Many others

Low Orbit Ion Cannon Primitive DDoS Attack, controlled via IRC Sends thousands of packets per second from the attacker directly to the target Like throwing a brick through a window Takes thousands of participants to bring down a large site They tried but failed to bring down Amazon

Low Orbit Ion Cannon

Operation Payback v. Mastercard Brought down Visa, Mastercard, and many other sites Attack is illegal and obvious Easily tracked, and easily blocked Dutch police have already arrested two participants

Mastercard Outage 3,000 to 30,000 attackers working together

Layer 7 Denial of Service

Jester's Tweets

Th3j35t3r v. Wikileaks He brought down Wikileaks single- handed for more than a day I was chatting with him in IRC while he did it, and he proved it was him by briefly pausing the attack

Wikileaks Outage One attacker, no botnet

XerXes Th3j35t3r's DoS Tool Uses incomplete Layer 7 requests Similar to the SlowLoris attack Can bring down a server with very little traffic--as little as one packet per second Can be routed through proxies like Tor to hide the attacker's origin Doesn't cause collateral damage to other network devices

Layer 7 DoS Subtle, concealable attack Low bandwidth Can be very difficult to distinguish from normal traffic Only requires one attacker, with no special hardware

Defending Websites

Attack > Defense Right now, your website is only up because Not even one person hates you, or All the people that hate you are ignorant about network security

Defense Mod Security--free open-source defense tool May not be much use against Layer 7 DoS Akamai has good defense solutions Caching DNS Redirection Javascript second-request trick

Counterattacks Reflecting attacks back to the command & control server Effective against dumb attackers like Anonymous Will lose effect if they ever learn about Layer 7 DoS

References

References How Secure Is Julian Assange's "Thermonuclear" Insurance File? http://goo.gl/sY6Nn Overview of Anonymous and their attack on MasterCard: http://goo.gl/lVsCD Operation Payback Toolkit: LOIC and HiveMind http://pastehtml.com/view/1c8i33u.html

References: Layer 7 DoS Attack Tools SlowLoris: http://ha.ckers.org/slowloris/ The OWASP DoS test tool http://www.owasp.org/index.php/ OWASP_HTTP_Post_Tool

References: Defense ModSecurity http://goo.gl/56hbl Akamai DDoS Report http://baythreat.org/ MichaelSmith_DDoS.pdf

References: Outage Charts ‘Tis the Season of DDoS – WikiLeaks Edition http://goo.gl/V5jZc