-
-
基于云的DDoS清洗服务可被轻易绕过
-
发表于: 2013-8-3 23:01 3255
-
新闻链接:http://www.crn.com/news/security/240159295/cloud-based-ddos-protection-is-easily-bypassed-says-researcher.htm
新闻时间:2013年08月01日11:13
新闻摘要:在Black Hat 2013大会上,渗透测试人员Allison Nixon展示了如何绕过基于DNS的DDoS清洗服务。基于DNS是指客户需要修改DNS记录指向服务提供商。Nixon说,如果采用BGP或串联硬件抗DDoS设备,方法就失效了。
新闻正文:
Some cloud-based services that provide monthly denial of service protection for their clients may be easily bypassed by a hacker determined to disrupt a specific website, according to a penetration tester that has found a way to easily exploit a common configuration weakness in the way many services are set up.
The cloud-based DDoS protection bypass can be used against services that require DNS-based DDoS mitigation to reroute and scrub traffic of unwanted packets, said Allison Nixon, a penetration tester and incident response handler at Bloomfield, Conn.-based managed security service provider Integralis. At the Black Hat security conference Wednesday, Nixon provided details about the configuration weakness and released a tool to automate the process of exploiting the flawed setup. Black Hat is owned and operated by UBM, CRN's parent.
"Bypassing these services is extremely easy; at this point I can bypass DDoS protection in almost every situation," Nixon said.
[Related: 5 Reasons DDoS Attacks Are Gaining Strength]
Nixon's tool can unmask a protected website in minutes. The method will not work on cloud-based services that support Border Gateway Protocol (BGP) routing or firms that install a physical anti-DDoS appliance in line with the network, Nixon said.
"If your service is an easy, convenient setup and only requires you to change DNS records, then you've got a problem," Nixon said. "If you switch to any BGP-based or inline filtering, it's all going through the filter anyway and you don't have to play hide and seek with your infrastructure."
A surge in denial of service attacks being carried out by activist groups against the financial industry and other businesses has prompted many firms to consider installing an appliance in the data center to reduce the risk that systems could be disrupted or rely on a cloud-based service for defense. DDoS attacks have become a growing problem because automated tools have improved and botnets of computers can be easily rented, putting the attack in the hands of less sophisticated attackers, say security experts.
Bypassing cloud-based DDoS protection is simple and requires no tools, but the tool created by Nixon automates the process. It locates DDoS-protected websites and unmasks them, making them susceptible to DDoS. The technology initially was developed to unmask criminal websites. The technique relies on uncovering the origin IP address of the target site.
The manual technique to carry out the attack relies on unmasking the website by trying to make outbound connections to get a site component to divulge its public IP address. Sites with more functionality are easier to unmask than sites with fewer features, Nixon said. For example, application-specific features, such as being able to upload an avatar on a forum, could reveal the origin IP address. Some hackers have sent fake DMCA requests to service providers -- an illegal practice -- in an effort to get the provider to divulge the origin IP of a customer site.
Nixon urged companies to find out how DDoS protection is being applied in their organization to determine if they are susceptible to the attack technique. Businesses that use cloud-based DDoS services that rely on DNS routing cannot fix the issue with a patch. Manual workarounds can help mitigate the issue, but they also can create complexity problems that cause more harm than good, Nixon said.
"If you have to stick with a DNS-based service you can change the configuration to make it less likely for the origin IP to be found," Nixon said. "You need to implement non-standard configurations, which can backfire on you. You also need to find and plug all sources of IP leakage."
Firms that sell cloud-based DDoS protection as part of a monthly service package have acknowledged the issue. Matthew Prince, founder and CEO of CloudFlare, which provides cloud-based DDoS protection services to its customers, said his firm offers support for BGP routing, shielding them from the attack technique. The firm also can use a configuration that further masks the origin IP address, making it difficult for an attacker to uncover it.
新闻时间:2013年08月01日11:13
新闻摘要:在Black Hat 2013大会上,渗透测试人员Allison Nixon展示了如何绕过基于DNS的DDoS清洗服务。基于DNS是指客户需要修改DNS记录指向服务提供商。Nixon说,如果采用BGP或串联硬件抗DDoS设备,方法就失效了。
新闻正文:
Some cloud-based services that provide monthly denial of service protection for their clients may be easily bypassed by a hacker determined to disrupt a specific website, according to a penetration tester that has found a way to easily exploit a common configuration weakness in the way many services are set up.
The cloud-based DDoS protection bypass can be used against services that require DNS-based DDoS mitigation to reroute and scrub traffic of unwanted packets, said Allison Nixon, a penetration tester and incident response handler at Bloomfield, Conn.-based managed security service provider Integralis. At the Black Hat security conference Wednesday, Nixon provided details about the configuration weakness and released a tool to automate the process of exploiting the flawed setup. Black Hat is owned and operated by UBM, CRN's parent.
"Bypassing these services is extremely easy; at this point I can bypass DDoS protection in almost every situation," Nixon said.
[Related: 5 Reasons DDoS Attacks Are Gaining Strength]
Nixon's tool can unmask a protected website in minutes. The method will not work on cloud-based services that support Border Gateway Protocol (BGP) routing or firms that install a physical anti-DDoS appliance in line with the network, Nixon said.
"If your service is an easy, convenient setup and only requires you to change DNS records, then you've got a problem," Nixon said. "If you switch to any BGP-based or inline filtering, it's all going through the filter anyway and you don't have to play hide and seek with your infrastructure."
A surge in denial of service attacks being carried out by activist groups against the financial industry and other businesses has prompted many firms to consider installing an appliance in the data center to reduce the risk that systems could be disrupted or rely on a cloud-based service for defense. DDoS attacks have become a growing problem because automated tools have improved and botnets of computers can be easily rented, putting the attack in the hands of less sophisticated attackers, say security experts.
Bypassing cloud-based DDoS protection is simple and requires no tools, but the tool created by Nixon automates the process. It locates DDoS-protected websites and unmasks them, making them susceptible to DDoS. The technology initially was developed to unmask criminal websites. The technique relies on uncovering the origin IP address of the target site.
The manual technique to carry out the attack relies on unmasking the website by trying to make outbound connections to get a site component to divulge its public IP address. Sites with more functionality are easier to unmask than sites with fewer features, Nixon said. For example, application-specific features, such as being able to upload an avatar on a forum, could reveal the origin IP address. Some hackers have sent fake DMCA requests to service providers -- an illegal practice -- in an effort to get the provider to divulge the origin IP of a customer site.
Nixon urged companies to find out how DDoS protection is being applied in their organization to determine if they are susceptible to the attack technique. Businesses that use cloud-based DDoS services that rely on DNS routing cannot fix the issue with a patch. Manual workarounds can help mitigate the issue, but they also can create complexity problems that cause more harm than good, Nixon said.
"If you have to stick with a DNS-based service you can change the configuration to make it less likely for the origin IP to be found," Nixon said. "You need to implement non-standard configurations, which can backfire on you. You also need to find and plug all sources of IP leakage."
Firms that sell cloud-based DDoS protection as part of a monthly service package have acknowledged the issue. Matthew Prince, founder and CEO of CloudFlare, which provides cloud-based DDoS protection services to its customers, said his firm offers support for BGP routing, shielding them from the attack technique. The firm also can use a configuration that further masks the origin IP address, making it difficult for an attacker to uncover it.
赞赏
他的文章
- [下载]中国电信漏洞威海分(转载的资料) 2141
看原图
赞赏
雪币:
留言: