Post

Availability Attacks

Availability Attacks


Availability Attacks

  • attempt to limit the accessibility and usability of a system.
  • Availability attacks vary widely,
    • consume the processor or memory resources on a target system, that system might be unavailable to legitimate users.
  • doing physical damage to that system.

Availability attack methods

Denial of Service (DoS)

alt text

  • sending the target system a flood of data or requests that consume the target system’s resources.
  • some operating systems (OS) and applications might crash when they receive specific strings of improperly formatted data,
  • attacker could leverage such OS/application vulnerabilities to render a system/ application inoperable.
  • The attacker often uses IP spoofing to conceal his identity when launching a DoS attack.

Distributed Denial of Service (DDoS)

alt text

  • DDoS attacks can increase the amount of traffic flooded to a target system.
  • an attacker compromises multiple systems (zombies), which can be instructed by attacker to simultaneously launch a DDoS attack against a target system.

TCP SYN Flood

alt text

alt text

  • One variant of a DoS attack
  • the attack can send multiple SYN segments to a target system with false source IP addresses in the header of the SYN segments.
  • Can never complete the three-way TCP handshake.
  • Because many servers limit the number of TCP sessions they can have open simultaneously,
  • a SYN flood can render a target system incapable, can not open a TCP session with a legitimate user.

Buffer Overflow

alt text

alt text

  • Buffer: a area of memory, a computer program that has been given a dedicated area of memory to which it can write.
  • Buffer overflow: a program attempts to write more information than the buffer can accommodate.
    • Injects code written by a malicious user into a running app.
    • Exploiting the common programming error of not checking whether an input string read by the app is larger than buffer (the variable into which it is stored).
  • If permitted to do so, the program can fill up its buffer and then have its output spill over into the memory area being used for a different program.
  • This could potentially cause the other program to crash.
  • Some programs are known to have this vulnerability (the characteristic of overrunning their memory buffers) and can be exploited by attackers.
This post is licensed under CC BY 4.0 by the author.

Comments powered by Disqus.