<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>TomsBlog</title>
    <link>http://www.toms-blog.com/tags/ddos/index.xml</link>
    <description>Recent content on TomsBlog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-uk</language>
    <atom:link href="http://www.toms-blog.com/tags/ddos/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>vDOS log analysis</title>
      <link>http://www.toms-blog.com/post/vdos-deep-dive/</link>
      <pubDate>Thu, 17 Nov 2016 20:41:08 +0000</pubDate>
      
      <guid>http://www.toms-blog.com/post/vdos-deep-dive/</guid>
      <description>

&lt;p&gt;Below is an analysis of the vDOS database log leek.
It was done using an ELK stack which can be found here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;http://www.toms-blog.com/post/vdos-analysis-elk-stack-vagrant/&#34;&gt;http://www.toms-blog.com/post/vdos-analysis-elk-stack-vagrant/&lt;/a&gt;&lt;/p&gt;

&lt;h2 id=&#34;types-of-attacks&#34;&gt;Types of attacks&lt;/h2&gt;

&lt;p&gt;The below pie chart shows the different types of attacks.
It shows that more than 50% of the attacks were DNS based attacks followed by NTP. This doesn&amp;rsquo;t come as a big shock as these protocols can easily be amplified due to the amount of misconfigured servers publicly available&lt;/p&gt;

&lt;canvas id=&#34;type_attacks&#34; style=&#34;max-width:500px;&#34;&gt;&lt;/canvas&gt;

&lt;h2 id=&#34;attacks-by-country-by-week&#34;&gt;Attacks by Country by Week&lt;/h2&gt;

&lt;p&gt;The graph below shows the 2 biggest targets of vDOS customers was China and the US with most other countries roughly hovering around the same amount. China seems to be attacked most with some weeks it being hit twice as much as the US.&lt;/p&gt;

&lt;canvas id=&#34;country_overtime&#34;&gt;&lt;/canvas&gt;

&lt;p&gt;Graphic below shows a visual representation of overall attacks globally.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/global-victims.JPG&#34; alt=&#34;vDOS global victims&#34; /&gt;&lt;/p&gt;

&lt;h2 id=&#34;attack-durations&#34;&gt;Attack Durations&lt;/h2&gt;

&lt;p&gt;The table below shows the average, min and max of attack durations.
These are put in to Seconds, Minutes and Hours, although in the logs themselves they are only given in seconds.&lt;/p&gt;

&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th align=&#34;left&#34;&gt;&lt;/th&gt;
&lt;th align=&#34;center&#34;&gt;Average&lt;/th&gt;
&lt;th align=&#34;center&#34;&gt;Max&lt;/th&gt;
&lt;th align=&#34;center&#34;&gt;Min&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;

&lt;tbody&gt;
&lt;tr&gt;
&lt;td align=&#34;left&#34;&gt;Seconds&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;1,624&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;25,200&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;30&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td align=&#34;left&#34;&gt;Minutes&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;27&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;420&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;0.5&lt;/td&gt;
&lt;/tr&gt;

&lt;tr&gt;
&lt;td align=&#34;left&#34;&gt;Hours&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;0.5&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;7&lt;/td&gt;
&lt;td align=&#34;center&#34;&gt;-&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;

&lt;h2 id=&#34;conclusions&#34;&gt;Conclusions&lt;/h2&gt;

&lt;p&gt;There&amp;rsquo;s a lot more data in the logs, the above is just a small amount, though you can draw some simple conclusions.&lt;/p&gt;

&lt;p&gt;DNS being the most used attack method was not a surprise due the prevalence of Open DNS resolvers and them being easily used in amplification attacks. The same can be said for NTP although I would have thought NTP would be used the most or at least the same amount as DNS due to recent publications of misconfigured NTP servers.  It also shows how the more traditional attacks such as TCP-SYN and TCP-ACK are being dropped in favour of the new amplification attacks.&lt;/p&gt;

&lt;p&gt;The most surprising bit of the above was the amount of attacks on China especially compared to America. You would always expect these 2 countries to be in the top spots but not by as much as they were, especially with China being attacked twice as much as the US.&lt;/p&gt;

&lt;p&gt;Another surprise was the average duration was only 30 minutes and the maximum only being 7 hours. These aren&amp;rsquo;t massive durations and shows more that this service was probably used for small attacks.&lt;/p&gt;
</description>
    </item>
    
    <item>
      <title>vDOS analysis with ELK stack and Vagrant</title>
      <link>http://www.toms-blog.com/post/vdos-analysis-elk-stack-vagrant/</link>
      <pubDate>Sun, 13 Nov 2016 15:48:19 +0000</pubDate>
      
      <guid>http://www.toms-blog.com/post/vdos-analysis-elk-stack-vagrant/</guid>
      <description>&lt;p&gt;vDOS was a booter service ran out of Israel allowing anyone to DDOS victims.
In July 2016 Brian Krebs obtained a database dump from the booter service giving insight into the techniques used and victims of the service.&lt;/p&gt;

&lt;p&gt;You can see Brian&amp;rsquo;s posts here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://krebsonsecurity.com/2016/09/alleged-vdos-proprietors-arrested-in-israel/&#34;&gt;https://krebsonsecurity.com/2016/09/alleged-vdos-proprietors-arrested-in-israel/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/&#34;&gt;https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;To analyse the database I&amp;rsquo;ve written a Vagrantfile which installs the ELK stack and uses logstash to put the vDOS log file into Elasticsearch, Kibana can then be used to analyse the data.&lt;/p&gt;

&lt;p&gt;The Vagrantfile and provision script can be found here:&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;https://github.com/thomasweaver/vdos-elasticsearch-vagrant&#34;&gt;https://github.com/thomasweaver/vdos-elasticsearch-vagrant&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE: The database is not provided here. You must obtain it yourself and copy it the vagrant folder with name attacks.txt&lt;/strong&gt;
&lt;strong&gt;The memory is set to 4GB in the Vagrantfile, make sure you have enough memory before doing a vagrant up&lt;/strong&gt;&lt;/p&gt;

&lt;div class=&#34;highlight&#34; style=&#34;background: #f0f3f3&#34;&gt;&lt;pre style=&#34;line-height: 125%&#34;&gt;&lt;span&gt;&lt;/span&gt;git clone https://github.com/thomasweaver/vdos-elasticsearch-vagrant.git
&lt;span style=&#34;color: #336666&#34;&gt;cd&lt;/span&gt; vdos-elasticsearch-vagrant
cp location-of-attack-database attacks.txt
vagrant up
&lt;/pre&gt;&lt;/div&gt;


&lt;p&gt;Kibana can then be access on&lt;/p&gt;

&lt;p&gt;&lt;a href=&#34;http://127.0.0.1:5601&#34;&gt;http://127.0.0.1:5601&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/kibana-discover.JPG&#34; alt=&#34;Kibana vDOS analysis discover page&#34; /&gt;&lt;/p&gt;

&lt;p&gt;You can then search for your IP, ASN, Company Name or URL.&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/kibana-google-inc-search.JPG&#34; alt=&#34;Kibana vDOS searching for attacks on Google&#34; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&#34;http://www.toms-blog.com/images/posts/vdos-analysis/googleinc-log-details.JPG&#34; alt=&#34;Kibana vDOS Google Inc attack details&#34; /&gt;&lt;/p&gt;

&lt;p&gt;The above shows a search for &amp;ldquo;Google Inc&amp;rdquo; and then an individual log entry&lt;/p&gt;
</description>
    </item>
    
  </channel>
</rss>