UGN Security Forums
My ProfileMember DirectoryLogin
Search our ForumsView our FAQView our Site Rules
View our CalendarView our Active TopicsGo to our Main Page

UGN Security Store
 

Network Sites UGN Security, The GoNix Initiative, Elite Web Gamers, Back of the Web, EveryDay Helper, VNC Web Design & Development
December
Su M Tu W Th F Sa
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31
Sponsored Links
Latest Postings
Latest Reviews
Topic Options
Rate This Topic
#40156 - 08/08/05 03:39 AM Stopping Automated Attack Tools
HighLander Offline

*****

Registered: 03/07/02
Posts: 270
Loc: Canada
Stopping Automated Attack Tools : An analysis of web-based application techniques capable of defending against current and future automated attack tools.

Quote:
An almost infinite array of automated tools exist to spider and mirror application content extract confidential material. brute force guess authentication credentials, discover code injection flaws, fuzz application variables for exploitable overflows, scan for common files or vulnerable CGI's, and generally attack or exploit web-based application flaws. While of great value to security professionals, the use of these tools by attackers represents a clear and present danger to all organisations.

These automated tools have become increasingly popular for attackers seeking to compromise the integrity of online applications, and are used during most phases of an attack. Whilst there are a number of defence techniques which, when incorporated into a web-based application, are capable of stopping even the latest generation of tools, unfortunately most organisations have failed to adopt them.
A good one to read if your into network security
_________________________
Unless you try something to which you have not already succeeded ~ Then you shall NEVER grow

Top
Sponsored Links
      
#40157 - 08/08/05 05:24 AM Re: Stopping Automated Attack Tools
Hallowed Be Thy Name Offline
Junior Member

Registered: 07/05/05
Posts: 4
Loc: N/A
Prime examples of what this article talks about is DoS and DDoS, and perhaps now to a lesser extent Smurfs. It seems now that most security corporations are now focusing on preventing attacks by increasing network security in perhaps a futile effort to eliminate or reduce the possible number of zombies/bots, but still this is a far cry from a full solution as there will allways be vunerable systems, and the ability to saturate lines or exhausting server memory.

Could a possible solution be to limit the frequency of packets under a certain size being sent on OS cleints, similar to flood control on web boards, these days with the size of most peoples lines small packets like that are rarely sent anyway, and most programs use far bigger or more complex packets ussaully. A real solution to DoS attacks is worth millions though.
_________________________
Assuming 0 is an invalid socket handle value.
Uncontrollably lame.

Top

Featured Member
Registered: 03/02/02
Posts: 136
Forum Stats
2152 Members
46 Forums
36148 Topics
71318 Posts

Max Online: 1567 @ 04/25/10 05:20 AM
Top Posters
UGN Security 29309
Gremelin 7193
§intå× 3255
SilentRage 1273
Ice 1146
pergesu 1136
Infinite 1041
jonconley 955
Girlie 908
unreal 860
Newest Members
cdefgh368568, HushHush, golqm, Tim050, Gecko666
2151 Registered Users
Who's Online
0 registered (), 367 Guests and 321 Spiders online.
Key: Admin, Global Mod, Mod
Latest News


Donate
  Get Firefox!
Get FireFox!