Page 203 - Hands-On Bug Hunting for Penetration Testers
P. 203

Other (Out of Scope) Vulnerabilities                                       Chapter 12

            DoS/DDoS ` The Denial-of-Service Problem


            Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) are familiar strains of
            cyberattack to anyone who follows security news. Flooding a target with traffic
            indistinguishable from a legitimate surge of visitors remains a popular method for either
            taking down or crippling a web property, especially when combined with amplification
            attacks caused by hijacking other servers, spoofing connected services, or taking advantage
            of an internal performance flaw or bottleneck.

            In 2018, GitHub was hit by what was then the largest DDoS attack ever recorded (the
            record was broken just five days later), clocking in at a saturation rate of about 1.3 TBps.
            One reason the attackers were able to achieve such a high throughput was because they
            relied on commandeering unsecured Memcached database servers (Memcache is a general-
            purpose distributed memory caching system), where they could spoof a query packet
            meant to look like the target server asking for data from the memcache server. Then, the
            memcache server would batter the target server with data up to 50,000 times the size of the
            spoofed request. GitHub in particular has been repeatedly targeted, with this incident just
            the latest in a sustained campaign against the site.
            If you look at GitHub's bug bounty program, you'll notice they do call out DDoS attacks
            specificallybthat they don't allow them:

            Don't perform any attack that could harm the reliability/integrity of our services or data.
            DDoS/spam attacks are not allowed. (emphasis theirs)

            DoS/DDoS attacks often aren't a result of anything that the victim of the attacks did d they
            didn't miscode the application, or leave some critical network vector open. Defending
            against DDoS attacks requires an entire proactive security architecture, redistributing the
            load across different networks and throttling/isolating malicious sources of traffic.

            The exception is when a DoS/DDoS attack is more effective because it can leverage a security
            flaw that exists on the victim network. If, as a security researcher, you come across, for
            example, an unsecured NTP server that could be hijacked to amplify a DDoS attack, you
            should certainly report it as a vulnerability that could be used to threaten either you or
            another bystander's network.

                         You should not try to validate any vulnerabilities like this by leveraging
                         them for increased bot traffic, even if you think it falls below the threshold
                         of something that could damage the target's infrastructure. The fact that
                         DDoS prohibitions are so common is a sign of how seriously they're taken
                         by bounty program operators.




                                                    [ 188 ]
   198   199   200   201   202   203   204   205   206   207   208