Download presentation
Presentation is loading. Please wait.
Published byRemington Runnels Modified over 9 years ago
1
DoS on Competitor Web Site
2
Phoenix has a “referral” from “Mr. Dobbs” ◦ Dobbs has threatened his girlfriend in the past ◦ Dobbs sent a “client” to Phoenix with a reminder about his girlfriend Client ◦ Works for a computer parts company ◦ $9B annual revenues ◦ Asking that a whistleblower organization’s web site (www.thetruthusa.org) be down/inaccessible for a single day Organization intends to splash damaging information on a specific day (day before the earnings statement release) Client does not wish to have the company’s stock prices fall just prior to the earnings release
3
Recon ◦ Shows the site to be amateurish ◦ Google search indicates that HS students were allowed to get experience in designing and putting up the website Phoenix hopes for poor design, maintenance/security and lower bandwidth
4
Find an unprotected wireless network to perform the hack Use an anonymizer Make a DDoS attack using Freak88 DDoS tool Test the DDoS tool in lab Infect unprotected hosts with the Server.exe Trojan Horse Take control of the infected hosts and launch the DDoS on the target site
5
Download contains ◦ Clienttrinno.exe ◦ Server.exe ◦ Msbvm50.dll Client controls the boxes which have the Trojan server running on them ◦ Servers will issue to pings ◦ These boxes are referred to as “zombies” The more zombies in the field attacking the victim, the better for the attacker!
6
Shift from email phishing attacks to web based attacks ◦ Email filters are becoming more effective ◦ Web based attacks are more popular now because so much is being put into “business rich” web sites and browsers fail to handle such content Their primary function is to render web pages SQL injection Cross site scripting Inline frames CSS Ping attacks might be filtered ◦ Accomplish the same effect using a web based attack
7
Attack #1: Test Attack #2: The one that worked Gain access to Pawn Web site Lab test the hack Modify the Pawn site
8
Phoenix ◦ Sets up a victim machine ◦ Starts up Wireshark filtering ICMP traffic ◦ Fires up a server zombie on a machine ◦ Fires up the client software Dialog box allows attacker to “stack” the IP’s and ports of the zombie machines Indicates the IP of the victim Buttons: Connect, Disconnect, and “Takemout” ◦ Wireshark confirms ton of ICMP traffic
9
Just to be sure… ◦ Phoenix attempts to ping the webpage at www.thetruthusa.org www.thetruthusa.org Gets Timed Out results It turns out that the students have set up a PIX firewall to prevent pings to the web server!
10
Inline frames ◦ If small, but many, inline frames can be installed on a web page Each frame can load the web page from a site FORCE MULTIPLIER! If you can constantly refresh each frame… better still
11
The trick is now to find a web site with lots of bandwidth and lots of traffic Social engineer the web design company ◦ Phoenix needs write access to the server Modify the home page ◦ Add inline frames calling the target’s homepage If 10 frames are added, every time a user brings up the unknowing accomplice’s page, 10 HTML “get” requests are issued against the victime If you “refresh” the inline request every 5 seconds…
12
Phoenix poses as a potential client ◦ Speaks with developers and requests a demonstration ◦ Representative shows Phoenix how quickly a page can be added In doing so, the rep refers to a 3-ring binder for the information on sites (credentials, etc) Phoenix notes the location of the binder Phoenix bribes the cleaner to photocopy the contents of the 3-ring binder
13
<iframe src=http://www.thetruthusa.org width = 0 height=0> ◦ Refreshing every 5 seconds Add a meta tag to the web page
14
Phoenix downloads the Pawn’s web page ◦ Inserts the inline frames and the meta tag ◦ FTP’s the altered page to the Pawn’s server
15
DDoS against the victim How long? ◦ Depends… If traffic is examined, requests for the page are coming from all over If IP is changed, the requests are made for URL and not IP… no effect! ◦ Someone would have to examine the pawn’s HTML within their page to spot the inline frames If reported to the pawn site, they might not notify the target that they were the unwitting accomplice Once the pawn replaces the modified page with the original Cached pages still might exist in browsers around the world…
16
Phoenix could have inserted a source pointer to a Trojan instead of the target’s URL ◦ If the pointer is to a keylogger, the pawn site could be made to appear as if they are infecting computers around the world What is the pawn company’s liability in this case?
17
Prevent disclosure of information via passive means ◦ Configure DNS not to reveal information (via registrar) ◦ Configure web server settings ◦ Don’t “advertise” information about the site or developers that nobody requires Even if removed from the web, historical pages might exist NETCRAFT might reveal information regardless…
18
ICMP ◦ Disable entry of Ping packets into the network from outside If required, then script a “block” from IP’s in the event that pings exceed a given number in a time period Might not be that effective in a DDoS attack…
19
Blocking DDoS attacks via web ◦ Create customize stack Costly (development and maintenance) Reserved for highly secured environments ◦ Rate limiting Bandwidth Connection limits ◦ Black hole filtering Send suspicious traffic to a nonexistent interface These are all counter to the reason the company site is up in the first place…
20
Review the web site hosting company’s policies and security statements Your company should authorize all changes ◦ One time passwords, maintained by your company Forces the developer to contact you for each modification
21
Physical access to information ◦ Paper format? ◦ Put onto encrypted electronic format, and then on a locked down workstation, which is physically protected Separation of duty Principle of least privilege
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.