Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The Dark Side of Things: DDoS attacks after Mirai

The Dark Side of Things: DDoS attacks after Mirai

Avatar for Artyom "Töma" Gavrichenkov

Artyom "Töma" Gavrichenkov

October 24, 2016
Tweet

More Decks by Artyom "Töma" Gavrichenkov

Other Decks in Technology

Transcript

  1. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT
  2. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT ASNumber: 32787 ASName: PROLEXIC- TECHNOLOGIES-DDOS- MITIGATION-NETWORK Ref: https://whois.arin.net/ rest/asn/AS32787
  3. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT ASNumber: 32787 ASName: PROLEXIC- TECHNOLOGIES-DDOS- MITIGATION-NETWORK Ref: https://whois.arin.net/ rest/asn/AS32787 https://www.peeringdb.com/asn/20940
  4. qrator.net 2016 Akamai: CDN vs DDoSM aut-num: AS20940 as-name: AKAMAI-ASN1

    org: ORG-AT1-RIPE mnt-by: AKAM1-RIPE-MNT mnt-routes: AKAM1-RIPE-MNT ASNumber: 32787 ASName: PROLEXIC- TECHNOLOGIES-DDOS- MITIGATION-NETWORK Ref: https://whois.arin.net/ rest/asn/AS32787 https://www.peeringdb.com/asn/20940
  5. qrator.net 2016 • NTP • DNS • SNMP • SSDP

    • ICMP 24 • NetBIOS • RIPv1 • PORTMAP • CHARGEN • QOTD Vulnerable protocols
  6. qrator.net 2016 • NTP • DNS • SNMP • SSDP

    • ICMP 25 • NetBIOS • RIPv1 • PORTMAP • CHARGEN • QOTD Amplification can be identified by source port Vulnerable protocols
  7. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150 000 – 170 000 vulnerable servers at once • SSL/TLS-enabled
  8. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150 000 – 170 000 vulnerable servers at once • SSL/TLS-enabled Amplification can be identified by source port?
  9. qrator.net 2016 Wordpress Pingback GET /whatever User-Agent: WordPress/3.9.2; http://example.com/; verifying

    pingback from 192.0.2.150 • 150 000 – 170 000 vulnerable servers at once • SSL/TLS-enabled Amplification can be identified by source port?
  10. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates
  11. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, including security fixes
  12. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, •Default logins/passwords including security fixes
  13. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, •Default logins/passwords •Full Internet access including security fixes
  14. qrator.net 2016 Internet of Things • Webcams, routers, smartphones, coffee

    makers • Cheap hardware and software • (Little to) NO software updates, •Default logins/passwords •Full Internet access including security fixes
  15. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec)
  16. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  17. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  18. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  19. qrator.net 2016 Internet of Things • Network scanners are now

    powerful enough to discover vulnerable IoT (good job, Flow Spec) =>
  20. qrator.net 2016 The Void • To survive TCP- and HTTPS-based

    attacks, one needs a session-capable and TLS-capable DPI • To survive large botnets, one needs a behavioral analysis and correlation analysis built into that DPI
  21. qrator.net 2016 The Void • To survive TCP- and HTTPS-based

    attacks, one needs a session-capable and TLS-capable DPI • To survive large botnets, one needs a behavioral analysis and correlation analysis built into that DPI • On the 1 Tbps bandwidth
  22. qrator.net 2016 The Void • Do not try to fix

    it yourself • Reach out to your ISP ASAP