Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:this is not NEW (Score 1) 116

The concept of web-based DDoS is not new. Attacks based on refreshing images and scripts have been around for a good while. The use of HTML5 cross-origin requests to perform these attacks at much higher rates, combined with URL shortening obfuscation, is, afaik, a new concept. That is not to say that others hadn't thought of it, but I certainly haven't seen it implemented anywhere.

But yeah, if you did indeed have this idea 10 years ago, before HTML5 was even conceived, I commend you. That kind of foresight is rare.

Comment Re:The joy of being a programmer... (Score 5, Interesting) 116

Thank you for pointing out the extra http:/// issue, it's been fixed in the live version. Bug leftover from an earlier test version.

The image tag display:block and position:absolute was to fix a bug I was seeing in one of the browsers (don't remember which) that pushed the iframe down slightly. I know the display:block was necessary, don't remember about the position:absolute. That might be a holdover from some other stuff I was messing with.

As for the Javascript, I like using Array() for readability. With the setTimeout, yeah, that was incompetence.

You are indeed correct, I am by no means a Javascript expert, and never claimed to be. I actually mention in the post that web development is not my strong suit, and what few skills I have are outdated. I got the idea for the attack after reading an interesting post by Attack and Defense Labs, and just wanted to hack something together in an hour or two to see if a.) I could reproduce their results and b.) my twist on it was a feasible idea. It seems so far that it was. But yeah, any suggestions you have are definitely welcome. Always love getting input from those smarter than me. Thanks
Security

Submission + - d0z.me: The Evil URL Shortener (spareclockcycles.org)

supernothing writes: DDoS attacks seem to be in vogue today, especially considering the skirmishes over Wikileaks in the past few weeks. The size of a DDoS attacks, however, has historically been limited by how many computers one has managed to recruit into a botnet. These botnets almost universally require code to be executed on the participants' local systems, whether they be willing or unwilling. A new approach has been emerging recently, however, which uses some simple Javascript to achieve similar ends. d0z.me is a new service that utilizes these techniques, but provides a unique twist on the idea. Posing as a legitimate URL shortening service, it serves users the requested pages in an iframe, while simultaneously participating in a DDoS attack in the background. No interaction is required beyond clicking the link and staying on the page. This makes it relatively trivial to quickly mount large scale DDoS attacks, and affords willing participants plausible deniability in the assault. Full writeup here.
Security

Submission + - Google Releases a Tutorial for Hackers 1

Hugh Pickens writes: ""Learn how hackers find security vulnerabilities and exploit web applications!" as the San Francisco Chronicle reports that Google has released Jarlsberg, a "small, cheesy" web application specifically designed to be full of bugs and security flaws as a security tutorial for coders and encourages programmers to try their hands at exploiting weaknesses in Jarlsberg as a way of teaching them how to avoid similar vulnerabilities in their own code. Jarlsberg has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The codelab is organized by types of vulnerabilities. In black box hacking, users try to find security bugs by experimenting with the application and manipulating input fields and URL parameters, trying to cause application errors, and looking at the HTTP requests and responses to guess server behavior while in white-box hacking, users have access to the source code and can use automated or manual analysis to identify bugs. The tutorial notes that accessing or attacking a computer system without authorization is illegal in many jurisdictions but while doing this codelab, users are specifically granted authorization to attack the Jarlsberg application as directed."

Comment Metasploit (Score 1) 234

has had this functionality for months now...
http://www.metasploit.com/modules/exploit/windows/fileformat/adobe_pdf_embedded_exe

Now, it's entirely possible that he found this on his own. But it's not exactly a new development...

Also, before anyone goes and claims to have found a way to get Java applets to execute arbitrary code as well:
http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/browser/java_signed_applet.rb
Red Hat Software

Fedora 12 Released 236

AdamWill writes "The Fedora Project is pleased to announce the release of Fedora 12 today. With all the latest open source software and major improvements to graphics support, networking, virtualization and more, Fedora 12 is one of the most exciting releases so far. You can download it here. There's a one-page guide to the new release for those in a hurry. The full release announcement has details on the major features, and the release notes contain comprehensive information on changes in this new release. Known issues are documented on the common bugs page."

Slashdot Top Deals

You have a massage (from the Swedish prime minister).

Working...