Bloody Death DoS-ing
Introduction In this article I am going to explain how to perform an amplified Denial Of Service (DoS) attack on a Web Application in a high level manner, but you should be aware that these are real world scenarios that I have implemented during costumer penetration tests. A successful DoS attack on a Web Application should happen in three different layers, the Web Application, the Web Application platform and the Web Server itself. It is common knowledge of course that you don't have to attack all three layers to successfully compromise the availability of a Web Server, but optimizing a DoS attack should be desirable from the perspective of an attacker. By using the word optimize I mean three things: Reduce to minimum the amount of the machines generating malicious traffic. Increase the amount Web Server downtime. Increase the amount of remediation time (e.g. recover time). Increase collateral damage (e.g. break the database). But first I should...