Penetration Testing mailing list archives
Re: rose fragmentation attack
From: "R. DuFresne" <dufresne () sysinfo com>
Date: Tue, 10 Jul 2007 11:30:56 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1No, it's about resource exhaustion. Now there are various resources that can be exhausted, the first being the width/breadth of the pipe, others being memory, storage space, the tcp/ip stack, etc.
There have been some pretty large sites/companies that have suffered denial of service attacks, some so sever they have been knocked out of business. It's just the nature of the game...
Thanks, Ron DuFresne On Mon, 9 Jul 2007, Jay wrote:
I often fine it interesting that folks make comments that few if any exist of any item just because they have no experience or the clients they deal with fail to effectively plan for Disaster Recovery or Business Continuity. There are thousands of Nodes that are resilent enough to resist different levels of DOS. It may be important to know if it would take several thousand or several million connections to take them offline. Its about threshhold assessment. After looking at the fine Web Design that sysinfo.com has though I guess I shouldnt be surprised by your short sightedness or your DUH. Nice spining animated .GIF from the 80's.
Yes, it's been about that long since I put any real work into the site son.
Jay ----- Original Message ----- From: R. DuFresne [mailto:dufresne () sysinfo com] To: jay.tomas () infosecguru com Cc: jnferguson () gmail com,pen-test () securityfocus com,pen-test-return-1078484493 () securityfocus com Sent: Fri, 6 Jul 2007 16:36:43 -0400 (EDT) Subject: Re: rose fragmentation attack -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Wed, 27 Jun 2007, Jay wrote: [SNIP]Its better they know they are susceptable to DoS in a penetration test vs. when their site is offline for hours/days when a botnet comes a knocking.I don't know, I take that statement as kinda a DUH! There are few if any sites that are not susceptable to DoS. And there are few if any sites that have a real, full, replicated mirror of their network in place to do an exact test of their production setup. Thanks, Ron DuFresne - -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ admin & senior security consultant: sysinfo.com http://sysinfo.com Key fingerprint = 9401 4B13 B918 164C 647A E838 B2DF AFCC 94B0 6629 ...We waste time looking for the perfect lover instead of creating the perfect love. -Tom Robbins <Still Life With Woodpecker> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFGjqfest+vzJSwZikRAjbXAJ9eXVgl2upIkPjeKQymXOWbOPwUSACg0YhE CdXfur2SOGpe32rIdHpVvSw= =KCnF -----END PGP SIGNATURE-----
- -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
admin & senior security consultant: sysinfo.com http://sysinfo.com Key fingerprint = 9401 4B13 B918 164C 647A E838 B2DF AFCC 94B0 6629 ...We waste time looking for the perfect lover instead of creating the perfect love. -Tom Robbins <Still Life With Woodpecker> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFGk6Yzst+vzJSwZikRAnm+AKDVQzy+6+dnWW4CY+QD5Ix3kjsCnACgs61z ldg1Dddil8ANLWJObNov0P4= =TgiO -----END PGP SIGNATURE----- ------------------------------------------------------------------------ This List Sponsored by: Cenzic Swap Out your SPI or Watchfire app sec solution for Cenzic's robust, accurate risk assessment and management solution FREE - limited Time Offer http://www.cenzic.com/wf-spi ------------------------------------------------------------------------
Current thread:
- Re: rose fragmentation attack R. DuFresne (Jul 06)
- <Possible follow-ups>
- Re: rose fragmentation attack Jay (Jul 09)
- Re: rose fragmentation attack R. DuFresne (Jul 10)