19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

152<br />

Part III: Hacking Network Hosts<br />

what everyone was blabbing about on Facebook (oh, the humanity!). Think<br />

about this: When hundreds of millions of people can be taken offline by one<br />

targeted DDoS attack, you can see why understanding the dangers of denial<br />

of service against your business’s systems and applications is important.<br />

DoS and DDoS attacks can be carried out with tools that the attacker either<br />

writes or downloads from the Internet. These are good tools to test your network’s<br />

IPS and firewalls for denial of service weaknesses. You can find programs<br />

that allow actual attacks. Some programs, such as idappcom’s Traffic<br />

IQ Professional (www.idappcom.com), also let you send controlled attacks.<br />

Testing<br />

Denial of service testing is one of the most difficult security checks you can<br />

run. There just aren’t enough of you and your computers to go around. Don’t<br />

fret. You can run a few tests to see where you’re weak. Your first test should<br />

be a search for DoS vulnerabilities from a vulnerability-scanning perspective.<br />

Using vulnerability scanners, such as QualysGuard (www.qualys.com) and<br />

WebInspect (www.hpenterprisesecurity.com/products/hp-fortifysoftware-security-center/hp-webinspect),<br />

you can find missing<br />

patches and configuration weaknesses that can lead to denial of service.<br />

During a recent security assessment project, QualysGuard found a vulnerability<br />

in an older version OpenSSL running on a web server. As with most DoS<br />

findings, I didn’t actually exploit the vulnerability because I didn’t want to<br />

take down the production system. Instead, I listed it as a “medium priority”<br />

vulnerability — an issue that had the potential to be exploited. My client<br />

pushed back and said OpenSSL wasn’t on the system. With permission, I<br />

downloaded the exploit code available on the Internet, compiled it, and ran<br />

it against my client’s server. Sure enough, it took the server offline.<br />

At first, my client thought it was a fluke, but after taking the server offline<br />

again, he bought into the vulnerability. It ended up that he was using an<br />

OpenSSL derivative, hence the vulnerability. Had my client not fixed the<br />

problem, there could have been any number of attackers around the world<br />

taking — and keeping — this production system offline, which could have<br />

been both tricky and time consuming to troubleshoot. Not good for business!<br />

Don’t test for DoS unless you have test systems or can perform controlled<br />

tests with the proper tools. Poorly planned DoS testing is a job search in the<br />

making. It’s like trying to delete data from a network share and hoping that the<br />

access controls in place are going to prevent it.<br />

Other DoS testing tools worth checking out are UDPFlood (www.mcafee.com/<br />

us/downloads/free-tools/udpflood.aspx), Blast (www.mcafee.com/<br />

us/downloads/free-tools/blast.aspx), NetScanTools Pro, and<br />

CommView.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!