Waraxe IT Security Portal  
  Login or Register
::  Home  ::  Search  ::  Your Account  ::  Forums  ::   Waraxe Advisories  ::  Tools  ::
March 28, 2024
Menu
 Home
 Logout
 Discussions
 Forums
 Members List
 IRC chat
 Tools
 Base64 coder
 MD5 hash
 CRC32 checksum
 ROT13 coder
 SHA-1 hash
 URL-decoder
 Sql Char Encoder
 Affiliates
 y3dips ITsec
 Md5 Cracker
 User Manuals
 AlbumNow
 Content
 Content
 Sections
 FAQ
 Top
 Info
 Feedback
 Recommend Us
 Search
 Journal
 Your Account



User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9145

People Online:
Visitors: 687
Members: 0
Total: 687
PacketStorm News
·301 Moved Permanently

read more...
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other security holes -> Apache
Post new topic  Reply to topic View previous topic :: View next topic 
Apache
PostPosted: Thu May 20, 2004 10:33 pm Reply with quote
Stonecold
Regular user
Regular user
 
Joined: May 20, 2004
Posts: 10
Location: Virginia




http://moorer-software.com/apache.htm

Link above has more information. I have tried many things on my server to prevent this particular attack, but the only thing that seems to work is to be in SSH at the time of the attack to ban the IP. Any ideas on a solution to prevent this? All of the solutions in that article were used beforehand. I have a copy program if anyone is interested in testing it out.
View user's profile Send private message Yahoo Messenger MSN Messenger
PostPosted: Fri May 21, 2004 10:42 am Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




There is one more issue - if you use a firewall and/or IDS to detect DoS flood packets and have them automatically banning source ip addresses, think about what happens when attackers spoof millions of ip addresses and after that nobody can connect to your server.
This scenario is discussed on various firewall manuals and there is no simple solution...
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Fri May 21, 2004 11:00 am Reply with quote
icenix
Advanced user
Advanced user
 
Joined: May 13, 2004
Posts: 106
Location: Australia




What type of attack?
if its SYN Flooding, with a bit of luck he will get tired of it...
if not there are some firewall rules that can just stop it all together...but ill have to ask my linux mate.. ill get back to you on it.

SYN flooding is a bitch but also effective Sad

_________________
=[WWW.WARAXE.US]=
-Forum Rules
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
PostPosted: Fri May 21, 2004 11:09 am Reply with quote
waraxe
Site admin
Site admin
 
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




In general, I am against any DoS attack and think that it is lame to use them. Only normal reason to use DoS is, if you are trying some clever hack attack and you need to knock out one or more of the machines for some time.
View user's profile Send private message Send e-mail Visit poster's website
hrmm
PostPosted: Fri May 21, 2004 11:12 am Reply with quote
icenix
Advanced user
Advanced user
 
Joined: May 13, 2004
Posts: 106
Location: Australia




DoS in itself is just a spastic hack.
anyone could do it and thats just what pisses me off..
if i could change 1 thing about the way DoS or anything else works it would be:
A: for all source codes (.c and .perl) BREAK UP the script so people cant use it

B: NEVER get anyone to compile a DoS tool into an .exe so some loser can use it.

im sure that would greatly reduce the ammount of people who do these things

_________________
=[WWW.WARAXE.US]=
-Forum Rules
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
PostPosted: Fri May 21, 2004 9:14 pm Reply with quote
Stonecold
Regular user
Regular user
 
Joined: May 20, 2004
Posts: 10
Location: Virginia




Yeah I have done lots of things to prevent syn flooding on my server. The only real fix is going to have to come from Apache it seems like.

echo 1 > /proc/sys/net/ipv4/tcp_syncookies shifts the load more towards the kernel and less towards apache. This helps out some.

Below is part of a bash script I also use:

Code:
#Reduce DoS'ing ability by reducing timeouts
echo 30 > /proc/sys/net/ipv4/tcp_fin_timeout
echo 1800 > /proc/sys/net/ipv4/tcp_keepalive_time
echo 1 > /proc/sys/net/ipv4/tcp_window_scaling
echo 0 > /proc/sys/net/ipv4/tcp_sack
echo 1280 > /proc/sys/net/ipv4/tcp_max_syn_backlog

#ANTISPOOFING
for a in /proc/sys/net/ipv4/conf/*/rp_filter;
do
echo 1 > $a
done

### chains to DROP too many SYN-s ######
/sbin/iptables -N syn-flood
/sbin/iptables -A syn-flood -m limit --limit 100/second --limit-burst 150 -j RETURN
/sbin/iptables -A syn-flood -j LOG --log-prefix "SYN flood: "
/sbin/iptables -A syn-flood -j DROP



Quote:
if its SYN Flooding, with a bit of luck he will get tired of it...


The server I use for hosting sites has not been a target luckily. Only servers that seem to get hit are ones that host "Yahoo Booter" sites, as this apache program has been passed around the Yahoo Messenger community.
View user's profile Send private message Yahoo Messenger MSN Messenger
Apache
  www.waraxe.us Forum Index -> All other security holes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT  
Page 1 of 1  

  
  
 Post new topic  Reply to topic  




Powered by phpBB © 2001-2008 phpBB Group






Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2020 Janek Vind "waraxe"
Page Generation: 0.156 Seconds