UGN Security Forums
My ProfileMember DirectoryLogin
Search our ForumsView our FAQView our Site Rules
View our CalendarView our Active TopicsGo to our Main Page

UGN Security Store

Network Sites UGN Security, The GoNix Initiative, Elite Web Gamers, Back of the Web, EveryDay Helper, VNC Web Design & Development
Sponsored Links
Latest Postings
by Herbert_Sherbert
09/07/15 10:34 AM
Latest Reviews
Topic Options
Rate This Topic
#40156 - 08/08/05 12:39 AM Stopping Automated Attack Tools
HighLander Offline


Registered: 03/07/02
Posts: 270
Loc: Canada
Stopping Automated Attack Tools : An analysis of web-based application techniques capable of defending against current and future automated attack tools.

An almost infinite array of automated tools exist to spider and mirror application content extract confidential material. brute force guess authentication credentials, discover code injection flaws, fuzz application variables for exploitable overflows, scan for common files or vulnerable CGI's, and generally attack or exploit web-based application flaws. While of great value to security professionals, the use of these tools by attackers represents a clear and present danger to all organisations.

These automated tools have become increasingly popular for attackers seeking to compromise the integrity of online applications, and are used during most phases of an attack. Whilst there are a number of defence techniques which, when incorporated into a web-based application, are capable of stopping even the latest generation of tools, unfortunately most organisations have failed to adopt them.
A good one to read if your into network security
Unless you try something to which you have not already succeeded ~ Then you shall NEVER grow

Sponsored Links
#40157 - 08/08/05 02:24 AM Re: Stopping Automated Attack Tools
Hallowed Be Thy Name Offline
Junior Member

Registered: 07/05/05
Posts: 4
Loc: N/A
Prime examples of what this article talks about is DoS and DDoS, and perhaps now to a lesser extent Smurfs. It seems now that most security corporations are now focusing on preventing attacks by increasing network security in perhaps a futile effort to eliminate or reduce the possible number of zombies/bots, but still this is a far cry from a full solution as there will allways be vunerable systems, and the ability to saturate lines or exhausting server memory.

Could a possible solution be to limit the frequency of packets under a certain size being sent on OS cleints, similar to flood control on web boards, these days with the size of most peoples lines small packets like that are rarely sent anyway, and most programs use far bigger or more complex packets ussaully. A real solution to DoS attacks is worth millions though.
Assuming 0 is an invalid socket handle value.
Uncontrollably lame.


Featured Member
Registered: 04/29/15
Posts: 2
Forum Stats
2158 Members
46 Forums
41462 Topics
76636 Posts

Max Online: 1567 @ 04/25/10 02:20 AM
Top Posters
UGN Security 34624
Gremelin 7193
§intå× 3255
SilentRage 1273
Ice 1146
pergesu 1136
Infinite 1041
jonconley 955
Girlie 908
unreal 860
Newest Members
Herbert_Sherbert, codemauve, Lillysdragon1984, Brewwit, Suri John
2157 Registered Users
Who's Online
0 registered (), 262 Guests and 203 Spiders online.
Key: Admin, Global Mod, Mod
Latest News

  Get Firefox!
Get FireFox!