All Projects β†’ Phenomite β†’ AMP-Research

Phenomite / AMP-Research

Licence: MIT license
Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks

Programming Languages

c
50402 projects - #5 most used programming language
python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to AMP-Research

ddos
Simple dos attack utility
Stars: ✭ 36 (-85.37%)
Mutual labels:  ddos, udp, ddos-attacks
overload
πŸ“‘ Overload DoS Tool (Layer 7)
Stars: ✭ 167 (-32.11%)
Mutual labels:  ddos, udp, ddos-attacks
anti-ddos-lite
Anti-DDoS-Lite (Anti-Crawler app) is a small PHP app to protect your site against DDoS attack.
Stars: ✭ 96 (-60.98%)
Mutual labels:  ddos, ddos-attacks
ddos-mitigation
Tips to mitigate and secure your large-scale server against DDoS attacks.
Stars: ✭ 58 (-76.42%)
Mutual labels:  ddos, ddos-attacks
Pummel
Socks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-78.46%)
Mutual labels:  ddos, ddos-attacks
DDoS-Script
A script written in perl for ddos ​​with automatic detection of open and vulnerable port that gives up to 1.5 gb packages / s
Stars: ✭ 30 (-87.8%)
Mutual labels:  ddos, udp
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-69.51%)
Mutual labels:  ddos, ddos-attacks
Ddos Rootsec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (-56.1%)
Mutual labels:  ddos, udp
Aoyama
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (-34.55%)
Mutual labels:  ddos, ddos-attacks
Raven-Storm
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (-4.47%)
Mutual labels:  ddos, ddos-attacks
websploit
Websploit is an advanced MITM framework.
Stars: ✭ 105 (-57.32%)
Mutual labels:  ddos, ddos-attacks
Impulse
πŸ’£ Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+118.7%)
Mutual labels:  ddos, udp
DDOS Detection
ddos attack detector using ML Algorithms
Stars: ✭ 38 (-84.55%)
Mutual labels:  ddos, ddos-attacks
Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-51.63%)
Mutual labels:  ddos, udp
Quack
Quack Toolkit is a set of tools to provide denial of service attacks. Quack Toolkit includes SMS attack tool, HTTP attack tool and many other attack tools.
Stars: ✭ 305 (+23.98%)
Mutual labels:  ddos, udp
DDos-Attack-OVH-
Powerful DDoS Attack
Stars: ✭ 155 (-36.99%)
Mutual labels:  udp, ddos-attacks
Wreckuests
Yet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (-44.31%)
Mutual labels:  ddos
pyddos
DDOS python script
Stars: ✭ 266 (+8.13%)
Mutual labels:  ddos-attacks
Ddos Scripts
This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.
Stars: ✭ 135 (-45.12%)
Mutual labels:  ddos
Burn-Byte
Burn Byte is a modern and powerful DDOS Toolkit
Stars: ✭ 37 (-84.96%)
Mutual labels:  ddos

AMP-Research

Research on exotic UDP/TCP amplification vectors, payloads and mitigations

The subfolders in this repository will contain the following:

  • Overview README.md
    • Name, Ports, Amplification factors, Update Info
    • Request <> Response Example with test IP (netcat yay!)
    • Potential official documentation
    • Potential mitigation strategies
  • The raw payload (e.g. for use in zmap) OR potential scanning script (C).
  • Raw socket flood script (C) for analysis to build flowspec or ACL mitigations.

Who referenced this repository (Kudos!)

What is "amplification" in respect to Denial of Service? Give me an Example!

Amplification is where well-formed or malformed socket or application data requests elicit a response larger than the input data. This can then be abused to "amplify" a request, usually by means of Distributed Reflected Denial of Service (DRDoS) attacks. This distinction is usually lumped under the one banner of "DDoS"; however the former indicates that the traffic does not directly come from bots or single servers but is reflected off of usually benign services, thus typically rendering blacklists and simple firewall solutions useless.

Best way to show what this means is using the network protocol MSSQL over TCP/IP UDP port 1434 as an example.

Example UDP response size from 1 byte to a MSSQL (Microsoft SQL Server) listener

echo -ne '\x02' | nc -u -q 2 190.xx.xx.xx 1434|xxd -p|wc -c

629 bytes

That's an amplification factor of over 23 times.

Example hex response from a discovery probe to an ARD (Apple Remote Desktop) listener

echo -ne '\x00\x14\x00\x01\x03' |nc -u 89.xx.xx.xx 3283|hexdump

0000000 0100 ea03 3100 0000 0000 0000 0000 0000
0000010 0000 0000 0000 0000 0000 0000 0000 0000
0000020 0000 0000 0000 0000 0100 0000 0000 0000
0000030 0000 0000 0000 0000 0000 0000 0000 0000
_
0000050 0000 1200 0000 0000 0000 0000 0000 0000
0000060 0000 0000 0000 0000 0000 0000 0000 0000
0000070 0000 0000 0000 0000 0000 0000 0000 640a
0000080 7461 6861 6565 6472 0034 0000 0000 0000
0000090 0000 0000 0000 0000 0000 0000 0000 0000
_
00000c0 0000 0001 0000 0000 0000 0000 0000 0000
00000d0 0000 0000 0000 9803 0000 0100 18f0 ed98
00000e0 9288 0000 0000 0a00 6400 6100 7400 6100
00000f0 6800 6500 6500 7200 6400 3400 0000 0000
0000100 0000 0000 0000 0000 0000 0000 0000 0000

Compiling the C code in this repo?

General C scripts:

gcc -pthread -O2 -o binary file.c

TCP scripts (requires 32bit compilation to avoid invalid checksum function return values):

gcc -m32 -pthread -O2 -o binary file.c

Vulnerable reflectors

This repo is here to help everyone mitigate amplification vectors that have yet to be abused or are being actively abused with little related or consolidated information.

Reflector lists are scanned and provided on a case by case basis or as necessary for remediation on pastebin here.

  • Examples of cases include:
    • Infected hosts that need to be quickly added to a blacklist to get the attention of network owners.
    • Protocols that are devastating (e.g. MemcacheD) and require publicized lists to blackhole or to bulk contact network owners.
    • Because shodan already has you.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].