Labels

Showing posts with label DDos attack. Show all posts
Showing posts with label DDos attack. Show all posts

Wednesday, 16 May 2012

how to check ddos attack on a server

I wrote about ddos attack in one of my post of DOS ATTACK . It can be done by many ways on a server. Here i am going to write the method by which you can check server under dos attack.


A quick and useful command for checking if a server is under ddos:

netstat -anp |grep ‘tcp\|udp’ | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -n





This command will show the list  of the IPs taking the most amounts of connections to this server. It is important to remember that ddos is becoming more sophisticated and they are using fewer connections with more attacking ips. If this is the case you will still get low number of connections even while you are under a DDOS.

Another very important thing to look at is how many active connections your server is currently processing.
netstat -n | grep :80 |wc -l
netstat -n | grep :80 | grep SYN |wc -I
The first command will show the number of active connections that are open to your server. Many of the attacks typically seen work by starting a connection to the server and then notsending any reply making the server wait for it to time out. The number of active connections from the first command is going to vary widely but if you are much above 500 you are probably having problems. If the second command is over 100 you are having trouble with a syn attack.
To Block a certain IP address that on server .Please use following commands
route add ipaddress reject
for example route add 192.168.0.168 reject
You can check whether given IP is blocked on server by using following command
route -n |grep IPaddress
OR
use follwoing command to block a ip with iptables on server
iptables -A INPUT 1 -s IPADRESS -j DROP/REJECT
service iptables restart
service iptables save
Then KILL all httpd connection and restarted httpd service by using following command
killall -KILL httpd
service httpd startssl
These are the simple steps you have to follow when attack is going on. Obviously you have to use your presence of mind while working on it. You will find many ways to solve this issue.

#RefRef- DDos tool developed by Anonymous


#RefRef- DDos tool developed by Anonymous



Amomymous are building a new Denial of service attack tool which is said to exploit SQL vulnerabilities to support the group's future campaigns. This is called #RefRef and developed in Javascript. This was very effective in a 17 minute attack from a single machine resulting in a 42-minute outage on Pastebin yesterday.  This was confirmed by the Pastebin via twitter.
This tool will e released in September. The tool uses a simple GUI to operate. As it turns out, the attack is launched client side, and will send a separate script in the connection request made to the target server. This request is actually the exploit itself, and once the server renders the code, it will continue to render it until crashing. In essence, the stronger the server, the faster it crashes.

download AnDOSid - DOS tool for android

A new product released by SCOTT HERBERT for Android mobile phones,Its AnDOSid - the DOS tool for Android Phones. The rise of groups like Anonymous and LuzSec, as well as constant India / Pakistan cyberwar has raised the issue of cyber-security high(er) in the minds of web owners.


Pentesting tools exist to simulate such attacks and help website security people defend against them, however for the most part they currently only exist for desktop computers. Mobile phones have, over the last few years, grown from simple devices that send and receive calls to mobile computing platforms which can be purchased for less than $100 a device.


AnDOSid fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.




Features:
Requires Internet access to send the http post data
Requires phone state to access the IMEI (one of the two identifiers sent with each post)

Download here:

BLOG AUTHORS