«
Expand/Collapse
46 items tagged "ddos"
Related tags:
ddos attacks [+],
denial of service [+],
ddos attack [+],
chaos communication congress [+],
sip servers [+],
polyvaccine [+],
poc [+],
part [+],
jan czmok [+],
isps [+],
hacker [+],
detection software [+],
detection [+],
current tools [+],
attack [+],
Software [+],
wikileaks [+],
whitepaper [+],
video [+],
service [+],
schutz [+],
pdf [+],
nicolas fischbach [+],
michael smith [+],
korean institutions [+],
korea [+],
hit [+],
fischbach [+],
denial of service attacks [+],
denial [+],
demonstration [+],
cloud [+],
anonymous [+],
analizi [+],
abwehr [+],
abu dhabi [+],
zyxel [+],
worms [+],
wordpress [+],
wong onn [+],
whmcs [+],
week [+],
weathers [+],
weapon of choice [+],
weapon [+],
under [+],
u.s. [+],
twitter [+],
tribal rights [+],
tribal [+],
traces [+],
tool [+],
tom brennan [+],
threat [+],
theresa may [+],
swoop [+],
stopped [+],
spamhaus [+],
south korea [+],
slides [+],
site [+],
self destruct [+],
self [+],
ryan c. barnett [+],
russian president [+],
russian embassy in london [+],
russian [+],
ruling [+],
router [+],
rights [+],
renewed [+],
record label [+],
protestors [+],
president fumes [+],
pirate bay [+],
per second [+],
opencart [+],
open source tool [+],
online [+],
netbsd [+],
mystery [+],
mitigation [+],
man [+],
malware [+],
lone hacker [+],
london [+],
link [+],
level authors [+],
law firm [+],
launched [+],
l. r. pennasilico [+],
krakow [+],
k. record [+],
jailed [+],
insurance company [+],
infrastructure level [+],
infests [+],
ifpi [+],
godaddy [+],
gene simmons [+],
game servers [+],
ftp service [+],
ftp [+],
forensics [+],
food processing [+],
fbi arrests [+],
fbi [+],
evil forces [+],
embassy in london [+],
embassy [+],
dos [+],
demonoid [+],
ddos tool [+],
cyber attack [+],
crashes [+],
commits [+],
china [+],
charity weathers [+],
charity [+],
case [+],
busted [+],
botnets [+],
botnet [+],
bot [+],
blitz [+],
blackmailers [+],
bittorrent [+],
bakeca [+],
attacks [+],
arrests [+],
arcserve [+],
and [+],
analysis [+],
alessio [+],
Countermeasures [+]
-
-
15:44
»
Packet Storm Security Recent Files
Polyvaccine is a detection software that enables protection to HTTP or SIP servers from unknown binary attacks, such as polymorphic exploit attacks, and DDoS at the application layer. Linux and FreeBSD platforms are supported.
-
15:44
»
Packet Storm Security Tools
Polyvaccine is a detection software that enables protection to HTTP or SIP servers from unknown binary attacks, such as polymorphic exploit attacks, and DDoS at the application layer. Linux and FreeBSD platforms are supported.
-
15:44
»
Packet Storm Security Misc. Files
Polyvaccine is a detection software that enables protection to HTTP or SIP servers from unknown binary attacks, such as polymorphic exploit attacks, and DDoS at the application layer. Linux and FreeBSD platforms are supported.
-
-
21:38
»
SecDocs
Authors:
Jan Czmok Tags:
DDoS Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: This workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis. The second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring). The results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks.
-
21:38
»
SecDocs
Authors:
Jan Czmok Tags:
DDoS Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: This workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis. The second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring). The results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks.
-
-
21:30
»
SecDocs
Authors:
Jan Czmok Tags:
DDoS Event:
Chaos Communication Congress 19th (19C3) 2002 Abstract: This workshop is divided in two parts. The first part presents current tools and measures to detect DDOS attacks, to block them and to do a post-mortem analysis. The second part will be an open discussion to find out ideas and capabilities of the community to improve countermeasures (e.g. distributed blocking or distributed monitoring). The results should be offered to interested ISPs and probably lead to development of tools to reduce - and probably prevent - DDOS attacks.
-
-
21:37
»
SecDocs
Tags:
malware DoS Event:
Black Hat Abu Dhabi 2011 Abstract: A Distributed Denial-of-Service(DDoS), one of the simplest and most powerful cyber attacks is a big problem nowadays. It has existed since the past, but now attackers can give greater damage to their target due to the development of more effective attack techniques and the propagation of high-speed internet and so on. Especially DDoS attack is now getting a huge problem because the unspecified individuals(called zombie PCs) are used in loading malicious codes while attacking a single site or system. DDoS attack is directly related to targeted companies, institutions and even governments, security companies and users as well. Plus, there is a possibility of running malicious code onto many other types of electronic devices such as smart phones, game consoles, home appliances and even cars. Therefore a new type of DDos attack might be seen in various places. In this presentation, we will figure out the large-scale DDoS attacks occurred in Korea(July 2009, March 2011) with detailed analysis and reverse tracking and how defenders(Korean institutions and security companies) coped with the attack. WE WILL NOT MENTION WHO THE ATTACKER IS. Also we will show the new type of DDoS attacks (by PC, smart phone, game console and so on) through demonstration. In this demonstration, we will handle the mechanism of DDos attacks including the type of attack, damage and preparation stage as well. Finally, we will suggest a solution of this problem. *IMPORTANT* This presentation tries not to include boring stuff. It will be fun with easy explanation and interesting demonstration.
-
21:37
»
SecDocs
Tags:
malware DoS Event:
Black Hat Abu Dhabi 2011 Abstract: A Distributed Denial-of-Service(DDoS), one of the simplest and most powerful cyber attacks is a big problem nowadays. It has existed since the past, but now attackers can give greater damage to their target due to the development of more effective attack techniques and the propagation of high-speed internet and so on. Especially DDoS attack is now getting a huge problem because the unspecified individuals(called zombie PCs) are used in loading malicious codes while attacking a single site or system. DDoS attack is directly related to targeted companies, institutions and even governments, security companies and users as well. Plus, there is a possibility of running malicious code onto many other types of electronic devices such as smart phones, game consoles, home appliances and even cars. Therefore a new type of DDos attack might be seen in various places. In this presentation, we will figure out the large-scale DDoS attacks occurred in Korea(July 2009, March 2011) with detailed analysis and reverse tracking and how defenders(Korean institutions and security companies) coped with the attack. WE WILL NOT MENTION WHO THE ATTACKER IS. Also we will show the new type of DDoS attacks (by PC, smart phone, game console and so on) through demonstration. In this demonstration, we will handle the mechanism of DDos attacks including the type of attack, damage and preparation stage as well. Finally, we will suggest a solution of this problem. *IMPORTANT* This presentation tries not to include boring stuff. It will be fun with easy explanation and interesting demonstration.
-
-
15:16
»
SecDocs
Authors:
Ryan C. Barnett Tom Brennan Tags:
DDoS DoS Event:
Black Hat DC 2011 Abstract: Denial-Of-Service is an attempt to make a computer resource unavailable to its intended users and is not new. In recent history April 2009, government and financial sites in the U.S. and South Korea were attacked by DDOS and were brought offline for days. This incident followed the Georgian DDOS attacks in 2008 and Estonian DDOS attacks in 2007. Common attack methods include systems infected with malware that are controlled and all connect to the target host at the same time using Layer 4 (Transport) which are already addressed by anti-DDOS solutions when employed. In 2009 a lethal form of Layer 7 (Application) attack techniques were being examined by Wong Onn Chee of OWASP Foundation Singapore and in 2010 together with Tom Brennan of OWASP Foundation presented the findings publicly for the first time with code samples. Tom Brennan will walk through the history and details of how this lethal HTTP POST DOS technique works, interesting findings in the protocol and the challenges in defending critical infrastructure against targeted attacks and demonstrate and release his open-source tool that can be used to test your own production systems -- or render others useless with the touch of a button from a single laptop.
-
-
21:15
»
SecDocs
-
-
21:04
»
SecDocs
Tags:
botnet DDoS DoS Event:
Chaos Communication Congress 26th (26C3) 2009 Abstract: Many years of hosting BBS's, ISP's, websites, game servers, forums, irc networks, and online communities. I've accrued experience dealing with the negative influences of DoS/DDoS, botnets, trolls, flooders, spammers, phishers, and the whole lot. I want to talk about the challenges, and victories. Using whatever tools necessary to achieve the goal, basically keeping services up for the users while maintaining security, secrecy/privacy, and balance. Tracking & Attacking/Reporting Botnets, Social Engineering, Dealing with Trolls, Flooders and other negative influences.