DDoS Attack Threats | DNS Flooder Attack Toolkit | Akamai Presentation

Published on March 2017 | Categories: Documents | Downloads: 26 | Comments: 0 | Views: 182
of 10
Download PDF   Embed   Report

Comments

Content


DNS Flooder: A Reflection Toolkit
Highlights from a Prolexic DDoS Threat Advisory
©2014 AKAMAI | FASTER FORWARD
TM
What is DNS Flooder?
• In mid-2013, the DNS Flooder Toolkit v1.1 was
leaked on popular hack forums
• The toolkit uses a new, popular method of crafting
large DNS resource records
• Malicious actors can amplify responses by a factor of
50 or more per DNS request, and may customize
their own DNS records, adding words and comments

©2014 AKAMAI | FASTER FORWARD
TM
DNS Flooder v1.1 Toolkit Screenshot
©2014 AKAMAI | FASTER FORWARD
TM
DNS Flooder: DDoS Attack Threat
• DNS Flooder is very popular
• The amplified nature of the attack means it only
needs a few servers to achieve a large DDoS flood
• Because of the reflection techniques DNS Flooder
uses, attackers are fully anonymous and the origin of
the attack is very difficult to pinpoint
• Several attacks have already been launched against
Akamai customers

©2014 AKAMAI | FASTER FORWARD
TM
Attack Overview
• One attack against an Akamai customer using the
DNS Flooder toolkit lasted approximately four hours
• Prior to the use of the tool, the attackers set up DNS
servers for their own use, building their own botnet
without the need for infection
• This method can also inject messages into the attack
payload

©2014 AKAMAI | FASTER FORWARD
TM
DDoS Flooder Attack Statistics
San Jose London Hong Kong Washington
Peak bits per second
(bps)
5.00 Gbps 80.00 Gbps 5.00 Gbps 20.00 Gbps
Peak packets per second
(pps)
400.00 Kpps 7.50 Mpps 400.00 Kpps 2.00 Mpps
Peak traffic values complied from Akamai scrubbing centers during a
DNS Flooder campaign
©2014 AKAMAI | FASTER FORWARD
TM
How Does DNS Flooder Work
• The toolkit uses a DNS reflection attack to
amplify DDoS bandwidth by a factor of 50 or
more
• The attacker sends a vulnerable DNS server
a DNS any resource record query
• The any resource record query returns all records of all types
stored on the server
• Can exceed 4,000 bytes
• By sending the request with a fake source
IP, the big any resource record is reflected to
the target

©2014 AKAMAI | FASTER FORWARD
TM
How DNS Flooder Works, cont.
• DNS Flooder crafts its IP header and DNS resource
header manually
• Requires root access on the attacking computer
• Allows nuances of DNS to be exploited to ensure
maximum possible response size
• Falsifying the IP address at the source makes the
original attack nearly untraceable – the requests are
totally anonymous
©2014 AKAMAI | FASTER FORWARD
TM
Threat Advisory: NTP – DNS Flooder toolkit
• Download the threat advisory, DNS Flooder v1.1
• This DDoS threat advisory includes:
•Indicators of the use of the DNS Flooder toolkit
•Analysis of the source code
•Example query created by the toolkit
•Sample payload
•Who is believed to be behind these attacks
•The SNORT rule and target mitigation using ACL entries
•Statistics and payloads from two observed DNS Flooder
campaigns against Akamai clients
•The full source code of DNS Flooder


©2014 AKAMAI | FASTER FORWARD
TM
About Prolexic (now part of Akamai)
• We have successfully stopped DDoS attacks for more
than a decade
• Our global DDoS mitigation network and 24/7 security
operations center (SOC) can stop even the largest
attacks that exceed the capabilities of other DDoS
mitigation service providers

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close