Your browser does not seem to support CSS. If images appear below, please disregard them.
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Sponsored Links
Latest Postings
· Blackbeard.....
by Gremelin on 10/06/15 01:01 AM
Topic Options
Rate This Topic
#40156 - 08/08/05 07:39 AM Stopping Automated Attack Tools
Joined: Mar 2002
Posts: 270
HighLander Offline
UGN Member
HighLander Offline
UGN Member

Joined: Mar 2002
Posts: 270
Stopping Automated Attack Tools : An analysis of web-based application techniques capable of defending against current and future automated attack tools.

An almost infinite array of automated tools exist to spider and mirror application content extract confidential material. brute force guess authentication credentials, discover code injection flaws, fuzz application variables for exploitable overflows, scan for common files or vulnerable CGI's, and generally attack or exploit web-based application flaws. While of great value to security professionals, the use of these tools by attackers represents a clear and present danger to all organisations.

These automated tools have become increasingly popular for attackers seeking to compromise the integrity of online applications, and are used during most phases of an attack. Whilst there are a number of defence techniques which, when incorporated into a web-based application, are capable of stopping even the latest generation of tools, unfortunately most organisations have failed to adopt them.
A good one to read if your into network security

Unless you try something to which you have not already succeeded ~ Then you shall NEVER grow
Sponsored Links
#40157 - 08/08/05 09:24 AM Re: Stopping Automated Attack Tools
Joined: Jul 2005
Posts: 4
Hallowed Be Thy Name Offline
Junior Member
Hallowed Be Thy Name Offline
Junior Member

Joined: Jul 2005
Posts: 4
Prime examples of what this article talks about is DoS and DDoS, and perhaps now to a lesser extent Smurfs. It seems now that most security corporations are now focusing on preventing attacks by increasing network security in perhaps a futile effort to eliminate or reduce the possible number of zombies/bots, but still this is a far cry from a full solution as there will allways be vunerable systems, and the ability to saturate lines or exhausting server memory.

Could a possible solution be to limit the frequency of packets under a certain size being sent on OS cleints, similar to flood control on web boards, these days with the size of most peoples lines small packets like that are rarely sent anyway, and most programs use far bigger or more complex packets ussaully. A real solution to DoS attacks is worth millions though.

Assuming 0 is an invalid socket handle value.
Uncontrollably lame.

Member Spotlight

Portland, OR; USA
Posts: 7,194
Joined: February 2002
Show All Member Profiles 
Forum Statistics
Most Online1,567
Apr 25th, 2010
Top Posters(All Time)
UGN Security 34,827
Gremelin 7,194
§intå× 3,255
SilentRage 1,273
Ice 1,146
pergesu 1,136
Infinite 1,041
jonconley 955
Girlie 908
unreal 860
Newest Members
Jan Havelles, Herbert_Sherbert, codemauve, Lillysdragon1984, Brewwit
2158 Registered Users
Who's Online Now
1 registered members (Gremelin), 100 guests and 160 spiders.
Key: Admin, Global Mod, Mod
Latest News
▼ Our Sponsors ▼

▲ Our Sponsors ▲