TCP/IP Transport Layer Attack Vector #6

5 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€67.18
List Price:  €95.97
You save:  €28.79
£55.86
List Price:  £79.80
You save:  £23.94
CA$97.87
List Price:  CA$139.82
You save:  CA$41.95
A$107.62
List Price:  A$153.75
You save:  A$46.13
S$94.24
List Price:  S$134.64
You save:  S$40.39
HK$544.83
List Price:  HK$778.36
You save:  HK$233.53
CHF 62.54
List Price:  CHF 89.34
You save:  CHF 26.80
NOK kr774.97
List Price:  NOK kr1,107.14
You save:  NOK kr332.17
DKK kr501
List Price:  DKK kr715.75
You save:  DKK kr214.74
NZ$119.95
List Price:  NZ$171.37
You save:  NZ$51.41
د.إ257.07
List Price:  د.إ367.26
You save:  د.إ110.19
৳8,361.58
List Price:  ৳11,945.63
You save:  ৳3,584.04
₹5,909.84
List Price:  ₹8,442.99
You save:  ₹2,533.15
RM312.71
List Price:  RM446.75
You save:  RM134.04
₦118,484.88
List Price:  ₦169,271.38
You save:  ₦50,786.49
₨19,443.22
List Price:  ₨27,777.22
You save:  ₨8,334
฿2,412.28
List Price:  ฿3,446.26
You save:  ฿1,033.98
₺2,418.32
List Price:  ₺3,454.90
You save:  ₺1,036.57
B$406.01
List Price:  B$580.04
You save:  B$174.03
R1,267.89
List Price:  R1,811.35
You save:  R543.45
Лв131.37
List Price:  Лв187.69
You save:  Лв56.31
₩98,301.65
List Price:  ₩140,436.95
You save:  ₩42,135.30
₪259.10
List Price:  ₪370.16
You save:  ₪111.06
₱4,125.14
List Price:  ₱5,893.31
You save:  ₱1,768.17
¥10,832.35
List Price:  ¥15,475.45
You save:  ¥4,643.10
MX$1,429.79
List Price:  MX$2,042.64
You save:  MX$612.85
QR255.18
List Price:  QR364.56
You save:  QR109.38
P956.90
List Price:  P1,367.06
You save:  P410.16
KSh9,061.51
List Price:  KSh12,945.58
You save:  KSh3,884.06
E£3,475.01
List Price:  E£4,964.52
You save:  E£1,489.50
ብር8,566
List Price:  ብር12,237.67
You save:  ብር3,671.66
Kz63,900.87
List Price:  Kz91,290.87
You save:  Kz27,390
CLP$69,057.73
List Price:  CLP$98,658.13
You save:  CLP$29,600.40
CN¥506.93
List Price:  CN¥724.22
You save:  CN¥217.29
RD$4,217.06
List Price:  RD$6,024.63
You save:  RD$1,807.57
DA9,397.90
List Price:  DA13,426.15
You save:  DA4,028.25
FJ$159.29
List Price:  FJ$227.57
You save:  FJ$68.27
Q540.13
List Price:  Q771.64
You save:  Q231.51
GY$14,638.82
List Price:  GY$20,913.50
You save:  GY$6,274.67
ISK kr9,776.20
List Price:  ISK kr13,966.60
You save:  ISK kr4,190.40
DH703.91
List Price:  DH1,005.63
You save:  DH301.72
L1,275.33
List Price:  L1,821.98
You save:  L546.64
ден4,132.76
List Price:  ден5,904.20
You save:  ден1,771.43
MOP$561.01
List Price:  MOP$801.48
You save:  MOP$240.46
N$1,268.91
List Price:  N$1,812.81
You save:  N$543.90
C$2,574.70
List Price:  C$3,678.31
You save:  C$1,103.60
रु9,449.77
List Price:  रु13,500.25
You save:  रु4,050.48
S/265.32
List Price:  S/379.05
You save:  S/113.72
K281.71
List Price:  K402.47
You save:  K120.75
SAR262.77
List Price:  SAR375.40
You save:  SAR112.63
ZK1,934.92
List Price:  ZK2,764.29
You save:  ZK829.37
L334.42
List Price:  L477.77
You save:  L143.34
Kč1,702.59
List Price:  Kč2,432.37
You save:  Kč729.78
Ft27,646.05
List Price:  Ft39,496.05
You save:  Ft11,850
SEK kr772.42
List Price:  SEK kr1,103.50
You save:  SEK kr331.08
ARS$70,259.44
List Price:  ARS$100,374.93
You save:  ARS$30,115.49
Bs483.50
List Price:  Bs690.75
You save:  Bs207.24
COP$307,238.59
List Price:  COP$438,931.09
You save:  COP$131,692.49
₡35,641.51
List Price:  ₡50,918.63
You save:  ₡15,277.11
L1,768.23
List Price:  L2,526.16
You save:  L757.92
₲546,248.87
List Price:  ₲780,388.98
You save:  ₲234,140.10
$U2,983.14
List Price:  $U4,261.82
You save:  $U1,278.67
zł291.40
List Price:  zł416.31
You save:  zł124.90
Already have an account? Log In

Transcript

Now let's talk about our second TCP IP model transport layer protocol, UDP. And our first attack vector for that is going to be UDP flood. As you know, UDP has no flex. I mean it's not a sophisticated protocol is TCP. Therefore the attack vectors in this protocol are limited. I mean the variety of the attack vectors.

However, it doesn't mean that they are ineffective. In fact, UDP attacks can be as much effective as any kind of TCP attacks. And we are going to see the reasoning behind that in a moment. So what is the UDP float? But I'll start off with a basic definition. UDP flood attack can be initiated by sending a large number of UDP packets to random ports on my remote host.

Actually, this random is not necessarily random. The attacker can choose some specific ports, like most common ones being 80, or 443, or 53. Basically, these are the ports for HTTP, HTTPS and DNS. So the attacker can specify targets, for example, your web traffic on 80 and 443. So not necessarily random as a result. This part is actually what we want to focus on in this lecture.

The distant host, meaning your host, will check for the application listening at that port. So for example, if the attack is performed on port 80, the host will check if an application is listening on that port. For example, a web application like Apache and in case of web traffic, for example, Port 80 expects TCP traffic. It doesn't expect and UDP traffic So, it will see that no application listens at that port for UDP. And this part is interesting and this part is basically what is making UDP flood attack effective. The host will try to reply with an ICMP destination unreachable packets for every single UDP packet that the attacker will send.

So, again your destination will try to answer with an ICMP destination unreachable, meaning that you know it will try to inform the client in our case the attacker that this port is not reachable via UDP. However, the attacker will exploit it by sending out UDP packets over and over again. So that the host your host will try to answer for each packet and in the end, the resources will not be enough and the services will go down How to detect this. First basically, we need to filter for specific destination ports, I mean the port that you suspect that attacker is attacking to, it could be 80 or 443. In most cases, or if you're running DNS again, it could be 53. And then you can also filter for ICMP responses that are sent.

This is also an important thing to check. And when it comes to volumetric attacks, we need to check also the volume spikes in the incoming traffic. Because this is also an indication of whether a volumetric attack is ongoing or not. And we have a simple power UDP plot might look like in our case, as we can see here, the destination port is 80. And there's one single destination IP One source. In this case a DoS attack is trying to take down the web servers of the destination by constantly sending the same UDP packets.

Now, how to mitigate it? Actually, most of the operating systems mitigate the attack by limiting the rate at which ICMP responses are sent. In other words, operating systems today are clever enough to limit the responses. Therefore limit exploitation of the resources for high volumetric ones. I mean, if you are hit by a really big attack, one of the first things to do is basically narrow down the top talkers, again by top talkers, meaning the IPS, the sources that are generating the most traffic towards your destinations. And if it is possible, trying to block these top talkers, if you cannot cope in either way, you might have to go with a CDN.

The rate controller solution. We are going to talk about advantages and disadvantages of rate controls with CDs towards the end of this course. But just for the heads up for such volumetric attacks if you cannot cope by yourself, a third party defense solution could be necessary.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.