-
Posts
29 -
Joined
-
Last visited
Posts posted by ihackforfun
-
-
This is all true and well but all your hardening will only be effective once an attacker actually gets on your system, you could stop them getting on your system in many ways (firewall to start with) and then make sure that there is nothing running on the system that you do not need (this means stopping, removing or disabling all services you do not use). The added benefit of removing services and software you do not need is that your system will boot faster and might even be faster while using ...
-
So I was reading a forum about DDoS protection. Someone had mentioned DDoS Deflate. Is it worth installing? What do you use for DDoS protection if anything?
I just published an article on DOS and DDOS in PenTest Magazine, here is a small part of the mitigation I discussed in the artice (another part of the article can be found on www.ihackforfun.eu without cost). The text makes nore sense if you read the complete article since I did not only cover website/webserver DOS and DDOS attacks but also network equipment and real world DOS attacks ...
It is very hard to defend a web service or web application
against every possible DOS attack. It is however possible
to mitigate a large number of attacks. Most of the
mitigation will be happening on the network equipment.
Some of the techniques used are traffic shaping (e.g.
there is a limited amount of bandwidth for each specific
IP address), request analysis (e.g. drop requests that are
malformed), blacklisting/whitelisting (i.e. banning IP addresses
that show clear evil intent or only allow IP addresses
from known good parties) etc. For websites it is
possible to separate static content from other content by
using CDN (content delivery networks), this will prevent
the picture loading attack from bringing down your web
application, the only visible effect will be that for legitimate
users the picture will not show but the rest of your
web application will work as expected. Some of these
mitigations are harmful in themselves, for example blacklisting
of evil IP addresses will stop the attack from a botnet
but will also prevent every computer in the botnet to
reach your website and could be preventing customers
to reach your web shop. Many of these mitigations fail to
point to the real attacker. Mitigation of DOS attacks might
require a significant investment that might be too high for
small to medium sized companies. These investments
include extra load balancers and higher bandwidth connections.
For large companies there is even a service
from Arbor Networks that will help in mitigating DOS attacks.
For those attacks where servers that are not configured
correctly are used, you can contact the server administrator
and hope he corrects the settings. This will of
course only help after the attack happened but it will prevent
that server from being used in subsequent attacks.
-
I would like to propose my own blog with a tutorial (ongoing series) on how to build a software hacking lab and an article on corporate spying ...
I plan to post at least once a week an interesting article with some kind of demo or guide on how to hack stuff ...
greets
Tips For Securing Your Own System?
in Security
Posted
In order to shut down/remove services you don't need, I have an article on my blog that shows how to do this for a fedora distro, it can easily be extended for other linux distros ...
http://www.ihackforfun.eu/index.php?title=improve-security-by-removing-services