Tag Archives: DDOS

NTP Amplification DDoS Attack on CloudFlare

DDoS

CloudFlare disclosed the information for the largest DDoS attack that exploited vulnerability in NTP protocol. The report estimates the DDoS attack to be 400 Gb/s. This is a new threat that target network time protocol on port 123 that is

From a Hacktivism against Ben Ali to a cyber war between political parties

operation-tunisia

By Haythem El MIR On January 2, 2011 around 22h, the group of activists Anonymous launched one of the most massive and severe attacks against Tunisian cyberspace, protesting against political practices that plague the freedom of Internet access and denouncing

Anonymous Going to Destroy Facebook

The hacker group published a YouTube video announcing their plan, and urging others to take down Facebook on November 5th. Maybe that the group has created the new tool called #RefRef and they feel to use it for launching distributed

Hacker groups LulzSec and Anonymous Attack Italian Police IT company

Hacker groups LulzSec and Anonymous just announced that they had hacked into the Italian Police IT company http://www.vitrociset.it/index/ the website currently displaying the following image: On the other hand the group Antisec has also developed a new tool for DDoS

Preventing Layer 7 DDoS Attack

WikiLeaks, th3j35t3r, LOIC are words that have been well known in the last period by the infosec community. These words get me directly thinking about the Application‐level DDoS attacks on websites such as Twitter, VISA, and MasterCard. Usually the attack

Two New HTTP POST Attack Tools Released

During 2010 OWASP Application Security Conference at Washington, researchers demonstrated how it is possible to conduct a new form of distributed denial of service “that floods the web server with a slow HTTP traffic. Currently there is two free utility

Quick Tips to Fight DDoS Attack

On previous post we shared the way to prepare our system to DDoS attack and the way to mitigate the risk. Now it is important to react in the good moment and make an effective action during the attack. Monitoring