Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ DDoSing with Other People's Botnets

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š DDoSing with Other People's Botnets


๐Ÿ’ก Newskategorie: Reverse Engineering
๐Ÿ”— Quelle: malwaretech.com

While I was reverse engineering ZeroAccess in order to write a monitoring system, I had an idea which would allow me to use ZeroAccess C&C infrastructure to reflect and amplify a UDP based DDoS attack, which I'd found to be beautifully ironic. After further analysis, I discovered it may even be possible to use non worker bots (which connect from behind NAT) to participate in the attack.

Zero Amplification

ZeroAccess is a peer-to-peer botnet (bots which can accept incoming connections act as servers and those that cannot act as workers). The p2p protocol is built on top of UDP and has a fairly significant size difference between the main request and response size, which is ideal for both reflection and amplification. Each bot send a 16-byte peer request via UDP to every supernode in its active list with the purpose of learning about new peers and files, if the supernode is online it responds with a UDP packet containing a 16-byte header, 16 peers and a list of available files. Each peer entry is 8 bytes and a file entry is 140 bytes (currently there are 2 files, so that brings the response to a total size of 424 bytes (almost 27 times larger than the request).

Using a server which allows source address spoofing, we can send a peer request packet to each supernode with the source IP spoofed to the IP of the system we wish to attack, resulting in each supernode "replying" with a 424 byte packet to the victim's IP address. Assuming we have a sever that can output at 1gb/s, the target will receive up to 26.5 gb/s worth of packets from various supernodes (though it will vary depending on how busy the supernodes are and their throughput).

Unfortunately, there's nowhere near as many supernodes as there are bots, due to something called NAT (Network Address Translation).

NAT

The idea behind NAT is to allow multiple computer to share the same public IP address (I'll give a brief and oversimplified explanation of how this works).
Above is an example of a very simple network consisting of 3 computers connected to a router. All of the computers access the internet using the public IP address 123.123.123.123, but on a network level none of them are aware of this. What actually happens is each device is assigned its own private IP address (10.0.0.x), and it's the router which holds the public IP address (123.123.123.123).

When a device (ex: 10.0.0.2) send a UDP packet to a host (ex: 8.8.8.8 on port 53), the packet is sent to the router (10.0.0.1) which stores some information in the NAT table (most importantly the source and destination IP + port), then replaces the source IP (10.0.0.2) with the public IP (123.123.123.123) so that the destination (8.8.8.8) will reply to 123.123.123.123 instead of 10.0.0.2 which is not a valid public IP address.

When 8.8.8.8 sends back a reply, it gets sent to the router (123.123.123.123) which then looks up the source IP (8.8.8.8) and source port (53) in the NAT table; because 10.0.0.2 originally sent a packet to 8.8.8.8 on port 53 there will be a match and the router will know to replace the destination IP (123.123.123.123) with the original source IP (10.0.0.2) and forward it to said device.

Assuming port forwarding is not enabled, when the router receives and incoming packet which does not match an entry in the NAT table (i.e. none of the devices have recently sent a packet to that IP and port) it is dropped; this is why devices behind NAT can communicate using connectionless protocols such as UDP, but cannot act as a UDP server. It's also important to note that NAT entries do not last forever, most routers will remove an entry after a period of about two minutes where no packets have been sent between the source and destination.


Theoretical Way to leverage worker bots during the attack

Even though worker bots can't act as supernodes because they're behind NAT, they still operate using the same code as that of the supernodes—That is, they bind a specific UDP port which they will send and received requests from. Due to this, when a supernode receives a peer request from a bot behind NAT, it can reply with a peer request and the worker bot will send a response (because they are running the same code supernodes do).

Obviously because we're spoofing peer requests from the victims IP address, in order for the packets to punch through the worker bot's NAT we need the bot to have recently sent a packet to the victim, we also need to know the source and destination port (as the NAT router will still drop the packets if the source and destination ports don't match the ones in the NAT table). If we go back to what I said earlier, the workers are running the supernode code (which binds a single port for all requests and responses), so all UDP packets are set from the same source port (we can acquire every worker bot's source port by running our own supernode and letting them connect to us). Now all we need is to get the worker to send a packet to the victim on a port of our choosing, giving us everything we need to punch through NAT).

So how exactly do we get the worker bot to connect to an arbitrary IP address? With the peer list of course. Theoretically we could add the victims IP and any port of our choosing to the peer list, resulting in all worker bots attempting to send peer requests to it (opening up NAT to replies from that IP and port combination). Once we know a peer request has been sent to the victim we can spoof a peer request back resulting in the worker bot sending the 424 byte response (All supernodes are contacted in order of newest to oldest every 40 minutes, so once our supernode receives a peer request from a worker bot, we know it has already sent one to the victim). All that's left to do now is start flooding the worker bots with spoofed peer requests from the victims IP and port which we put in the peer list.


Conclusion

The laws when it comes to DDoSing something (even with full permission from the victim) are incredibly grey and made even more so by the fact we'd be using other people's computer to relay the attack. As it happens I'm quite picky when it comes to food, making prison likely a less than enjoyable experience, so here's a graph of what this attack may look like if I were to do it.

 

...













๐Ÿ“Œ DDoSing with Other People's Botnets


๐Ÿ“ˆ 55.81 Punkte

๐Ÿ“Œ DDoSing with Other Peopleโ€™s Botnets


๐Ÿ“ˆ 55.81 Punkte

๐Ÿ“Œ DDoSing with Other People's Botnets


๐Ÿ“ˆ 55.81 Punkte

๐Ÿ“Œ DDoSing with Other Peopleโ€™s Botnets


๐Ÿ“ˆ 55.81 Punkte

๐Ÿ“Œ Rich People Pay Less Attention To Other People, Says Study


๐Ÿ“ˆ 24.52 Punkte

๐Ÿ“Œ Why Most People Trust Robots Over Other People for Mental Health


๐Ÿ“ˆ 24.52 Punkte

๐Ÿ“Œ Rich People Pay Less Attention To Other People, Says Study


๐Ÿ“ˆ 24.52 Punkte

๐Ÿ“Œ New botnet attack "puts other IoT botnets to shame"


๐Ÿ“ˆ 24.24 Punkte

๐Ÿ“Œ Thousands of IP Cameras Hijacked by Persirai, Other IoT Botnets


๐Ÿ“ˆ 24.24 Punkte

๐Ÿ“Œ The FBI Is Arresting People Who Rent DDoS Botnets


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ The FBI Is Arresting People Who Rent DDoS Botnets


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Need Info / Sources / People to be able to interview about Botnets, Clusters, and P9 CPU Servers


๐Ÿ“ˆ 24.04 Punkte

๐Ÿ“Œ Why Anonymous Should Spy on ISIS Forums Rather than DDoSing Them


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ DDoSing has evolved in the vacuum left by IoT's total absence of security


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Why Anonymous Should Spy on ISIS Forums Rather than DDoSing Them


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ DDoSing has evolved in the vacuum left by IoT's total absence of security


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Sad-sack Anon calling himself 'Mr Cunnilingus' online is busted for DDoSing ex-bosses


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Script kiddie goes from 'Bitcoin Baron' to 'Lockup Lodger' after DDoSing 911 systems


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ โ€˜DerpTrollโ€™ Faces 10 Years in Prison for DDoSing Gaming Sites as a Teen


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Ukraine Watch: 6 Young Hackers Caught DDoSing and Stealing Money From Bank Accounts


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Ubisoft sues handful of gamers for DDoSing Rainbow Six: Siege


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Firefox 77.0.1 released to prevent DDoSing DoH DNS providers


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Is DDoSing illegal? | UpGuard


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Google has been DDoSing SourceHut for over a year


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Teen Avoids Jail Time After DDoSing Australia's Biggest Bank & E-Crime Portal


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Turkish Hackers Offering Hacking Tools as Prizes for DDosing Political Websites


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ 'Russian hacktivists' claim responsibility for DDoSing German airport websites


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Russian IT Guy Jailed for DDoSing Government Websites


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Russian IT guy sent to labor camp for DDoSing Kremlin websites


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Teen Avoids Jail Time After DDoSing Australia's Biggest Bank & E-Crime Portal


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ Turkish Hackers Offering Hacking Tools as Prizes for DDosing Political Websites


๐Ÿ“ˆ 23.46 Punkte

๐Ÿ“Œ DDoSing Hospital Networks Landed This Hacktivist in Jail for Over 10 Years


๐Ÿ“ˆ 23.46 Punkte

matomo