Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A vulnerability in the command and control (C&C) structure of the infamous Dirt Jumper distributed denial of service (DDoS) toolkits has been detailed which can be used to foil attacks.
The toolkits were based on RussKill and had rapidly become some of the most popular DDoS in the underground market, overtaking dominant rivals like Black Energy.
Thanks to a string of simple coding vulnerabilities, it was possible to access the C&C database and server-side configuration files with open source pen testing tools, anti-DDoS vendor Prolexic said.
“With this information, it is possible to access the C&C server and stop the attack,” chief executive Scott Hammack said. “It is our duty to share this vulnerability with the security community at large.”
The company also detailed information on the Pandora DDoS toolkit, used to attack the blog of Brian Krebs last week. The toolkit used HTTP Min, HTTP Download, HTTP Combo, Socket Connect and Max Flood attacks, the latter of which was used to take down Krebs’ site.
“The HTTP Combo offers a one-two punch that targets the application and infrastructure layer simultaneously, while the Max Flood attack initiates a flood that contains a 1-million-byte payload within the POST request,” Prolexic said.
The toolkit was advertised as have having slowed the Yandex search engine – the most popular in Russia and fifth in the world – to a crawl, and could take out a typical website with 10 infected bots
The toolkit’s code was “messy” however and contained typographical errors.
Prolexic said: “Infected bots beacon to the user’s C&C panel with broken GET requests that identify the availability of the bots. In addition, a GET request in the Socket Connect attack is sent as an ‘ET’ request, which is invalid HTTP request. Some web servers such as Apache, however, will interpret the ET request as a GET request and will respond with a valid OK response. Other web servers, such as nginx, will return a Bad Request error message.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.