Beginner'S Guide To: Brute Force & Ddos Attacks
Beginner'S Guide To: Brute Force & Ddos Attacks
Beginner'S Guide To: Brute Force & Ddos Attacks
DDoS attacks launched by botnets truly have two victims: the targeted organization
(whose services/sites are shut down) and the hosts of the botnet (whose architectures
are being commandeered to perform illegal actions, while legitimate business
activity is compromised).
DDoS attacks continue to evolve. Today, for instance, advanced persistent threat
(APT) attacks can flood both a targeted organization and its ISP via scheduled
sequences of many different attack vectors (such as the application layer, cross-site
scripting, and SYN packet floods) and they can last for a period of weeks.
So, going forward, organizations will have to develop a defensive strategy of equal
sophistication. They will need to take advantage of all the techniques described
above, and new ones as they emerge, to create a layered, multifaceted security
architecture that prevents and defends against the effects of distributed denial of
service attacks as comprehensively as possible.
Brute Force Attack
Why bother to pick a lock if you can simply kick in the door?
Thats the logic behind the brute force attack, one of the most common
of all security exploits. The idea behind brute force is simple: simply try all
possibilities until you find the one that works. Typically, there is no prioritization
of some possibilities over others. Instead, all are tried systematically in a
simple sequence, such as alphanumerical.
Brute force attacks fall, generally speaking,
into two classes. The more common involves an
online resource or service, such as an e-mail service;
here, the hacker attempts to find a correct password.
* #1 is Denial of Service
Why are Brute force Attacks Employed?
Whats the motive behind a brute force attack? The most obvious is also the most
common: privileged access to restricted data, applications, or resources of all kinds.
In some cases, a brute force attack is also a logical stepping-stone or pivot point
by brute-forcing to point A, its then possible to launch subsequent exploits (perhaps
of a different type) to get to points B-Z. The hacker may also seek to install something
such as a rootkit, add a new bot to a botnet, create a command and control center
for a botnet, or (if possible) simply steal money or sensitive information (such as credit
card numbers or banking credentials) that lead directly to money.
How to Identify Brute Force Attacks
So how can you spot a brute force attack while it is happening? No single indicator is certain,
but these are all logical possibilities. Many failed log-ins from the same IP address. This is a
particularly strong sign (though if the attacker is using a botnet, IP addresses will obviously vary).
Logins with multiple username attempts emerging from the same IP address
A referring URL that contains the username and password in this format:
http://user:password@www.example.com/login.htm
Failed log-in attempts that include passwords commonly used by users and
hackers alike (123456, password, qwerty, pwnyou, etc.)
Putting Up a Stout Defense
Toward fending off a brute force attack, a variety of straightforward options include:
Locking the account after a fixed number of failed attempts. Apples failure to implement this
initially in its iCloud service led, in 2014, to successful brute force hacks and the mass distribution of
embarrassing celebrity photos.
Delaying the response time. The more time between permitted password attempts, the more slowly
the brute force attack will proceed, and the more time is available for sysadmins to discover an attack
is underway.
IP address lock-out. If failed attempts from a given IP address exceed a maximum predefined
number, that address can be locked out though if the attacker is using a botnet, with many IP
addresses for its bots, this approach will be inadequate.
Detection tools. Based on key indicators such as the bulleted list provided above, tools such as
OSSEC can sometimes detect a brute force attack is underway and take direct action to block it, notify
administrators of it, or both.
Brute force site scanners. The idea behind these tools is to go through site logs looking for signs
that a brute force exploit has recently been attempted. While the horse may be out of the barn in such
a case, its still worthwhile knowing that it happened, so that effective measures can be implemented
to prevent a recurrence.
The Future of Brute Force Attacks
Unfortunately, brute force is a class of attack thats unlikely to vanish any time soon.
Going forward, in fact, its clear that brute force attacks are likely to become both
more prevalent and more effective.
This is a simple consequence of the fact that the more computational power you
have, the faster and more successful a brute force attack is likely to be, all other
factors being equal. And in todays world of botnets, not to mention scalable grid and
cloud architectures, computational power is relatively cheap and easy to get.
In the near future, in fact, artificial intelligence may even be applied to simplify/
prioritize the brute force process by focusing on the most promising possibilities first.
This being the case, security professionals will have to stay on their toes.
HOW ALIENVAULT HELPS DEFEND AGAINST
DDOS AND BRUTE FORCE ATTACKS
DDoS and brute force login attacks continue to plague organizations because they are simple
and effective in meeting attackers objectives. The key in defending against these types of
attacks is your ability to detect and quickly respond to minimize the impact to your organization.
The AlienVault Unified Security Management (USM) platform provides the essential security
capabilities that organizations of all sizes need to detect, prioritize, and respond to threats like
DDoS and brute force attacks. To keep our users up to date with new and evolving threats,
the AlienVault Labs team performs the threat research that most IT teams simply dont have
the expertise, time, budget, or tools to do themselves. This research is then converted into
actionable feeds that are pushed out regularly to the USM platform with updated correlation
directives and malicious behavioral signatures.
In addition, USM can be tightly integrated with the Open Threat Exchange (OTX). You have
the opportunity to join, contribute, and benefit from this community of like-minded and similarly
exposed IT teams that share threat intelligence and IP reputation of known bad actors that
have been operating DDoS and brute force campaigns against them.