Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The Dark Side of Things: DDoS attacks after Mirai

The Dark Side of Things: DDoS attacks after Mirai

Artyom "Töma" Gavrichenkov

October 24, 2016
Tweet

More Decks by Artyom "Töma" Gavrichenkov

Other Decks in Technology

Transcript

  1. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT
  2. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT ASNumber: 32787 ASName: PROLEXIC- TECHNOLOGIES-DDOS- MITIGATION-NETWORK Ref: https://whois.arin.net/ rest/asn/AS32787
  3. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT ASNumber: 32787 ASName: PROLEXIC- TECHNOLOGIES-DDOS- MITIGATION-NETWORK Ref: https://whois.arin.net/ rest/asn/AS32787 https://www.peeringdb.com/asn/20940
  4. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT ASNumber: 32787 ASName: PROLEXIC- TECHNOLOGIES-DDOS- MITIGATION-NETWORK Ref: https://whois.arin.net/ rest/asn/AS32787 https://www.peeringdb.com/asn/20940
  5. qrator.net 2016 • NTP • DNS • SNMP • SSDP

    • ICMP 24 • NetBIOS • RIPv1 • PORTMAP • CHARGEN • QOTD Vulnerable protocols
  6. qrator.net 2016 • NTP • DNS • SNMP • SSDP

    • ICMP 25 • NetBIOS • RIPv1 • PORTMAP • CHARGEN • QOTD Amplification can be identified by source port Vulnerable protocols
  7. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150 000 – 170 000 vulnerable servers at once • SSL/TLS-enabled
  8. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150 000 – 170 000 vulnerable servers at once • SSL/TLS-enabled Amplification can be identified by source port?
  9. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150 000 – 170 000 vulnerable servers at once • SSL/TLS-enabled Amplification can be identified by source port?
  10. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates
  11. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, including security fixes
  12. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, •Default logins/passwords including security fixes
  13. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, •Default logins/passwords •Full Internet access including security fixes
  14. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, •Default logins/passwords •Full Internet access including security fixes
  15. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec)
  16. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  17. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  18. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  19. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  20. qrator.net 2016 The Void • To survive TCP- and HTTPS-based

    attacks, one needs a session-capable and TLS-capable DPI • To survive large botnets, one needs a behavioral analysis and correlation analysis built into that DPI
  21. qrator.net 2016 The Void • To survive TCP- and HTTPS-based

    attacks, one needs a session-capable and TLS-capable DPI • To survive large botnets, one needs a behavioral analysis and correlation analysis built into that DPI • On the 1 Tbps bandwidth
  22. qrator.net 2016 The Void • Do not try to fix

    it yourself • Reach out to your ISP ASAP