Application vulnerability due to Non Random Hash Functions

Understanding Attack Vector How HashMaps work Say a comment form on a blog accepts the parameters – first_name, last_name, comment – as post parameters. Internally, Tomcat stores these parameters as a HashMap. The logical structure of this HashMap is like this – “first_name” –> “Sripathi” “last_name” –> “Krishnan” “comment” —> “DoS using poor Hashes” But … Read more

Can one cache and secure a REST API with Cloudflare?

Cloudflare has published a list of best practices for using it with APIs. TL;DR, they recommend setting a page rule that patches all API requests and putting the following settings on it: Cache Level: Bypass Always Online: OFF Web Application Firewall: OFF Security Level: Anything but “I’m under attack” Browser Integrity Check: OFF

What is a Ray ID (Cloudflare)?

It is a UID which can be used by the website operator (and Cloudflare support) to potentially debug issues. The ray id is actually returned in the headers of most requests through Cloudflare, just not as visibly as what you see in the case of I’m under attack mode.

How to protect against distributed denial-of-service attacks in Node.js with Socket.io?

Look into JS event throttling and debouncing! Those techniques will help you prevent and detect attacks to a certain point (which is, in my opinion, enough for a small multiplayer socket game)… EDIT: In this jsfiddle: http://jsfiddle.net/y4tq9/9/ var sIO = {}; sIO.on = (function(){ var messages = {}; var speedLimit = 5; //5ms return function(message, … Read more

How to enable DDoS protection?

DDOS is a family of attacks which overwhelm key systems in the datacenter including: The hosting center’s network connection to the internet The hosting center’s internal network and routers Your firewall and load balancers Your web servers, application servers and database. Before you start on building your DDOS defence, consider what the worst-case value-at-risk is. … Read more

Tools for simulating DDoS attacks [closed]

There are basically three types of DDOS attacks: —–>Application-layer DDOS attack —–>Protocol DOS attack —–>Volume-based DDOS attack > Application layer DDOS attack: Application-layer DDOS attacks are attacks that target Windows, Apache, OpenBSD, or other software vulnerabilities to perform the attack and crash the server. > Protocol DDOS attack DDOS attack : A protocol DDOS attacks … Read more