biggest DD0S Attack

The last month has seen probably the largest distributed denial-of-service (DDoS) attack ever. A massive 300Gbps was thrown against Internet blacklist maintainer Spamhaus’ website but the anti-spam organisation , CloudFlare was able to recover from the attack and get its core services back up and running.

Spamhaus, a group based in both London and Geneva, is a non-profit organisation that aims to help email providers filter out spam and other unwanted content. Spamhaus is pretty resilient, as its own network is distributed across many countries, but the attack was still enough to knock its site offline on March 18.
Five national cyber-police-forces are investigating the attacks.  A group calling itself STOPhaus, an alliance of hactivists and cyber criminals is believed to responsible for bombarding Spamhaus with up to 300Gbps.
The attacks on Spamhaus illustrate a larger problem with the vulnerability of systems fundamental to the architecture of the Internet, the Domain Name Servers (DNS). The high attack bandwidth is made possible because attackers are using misconfigured domain-name service (DNS) servers known as open recursive resolvers or open recursors to amplify a much smaller attack into a larger data flood.
DDoS attack

Known as DNS reflection, the technique uses requests for a relatively large zone file that appear to be sent from the intended victim’s network. According to CloudFlare, it initially recorded over 30,000 DNS resolvers that were tricked into participating in the attack. There are as many as 25 million of these open recursive resolvers at the disposal of attackers

In the Spamhaus case, the attacker was sending requests for the DNS zone file for ripe.net to open DNS resolvers. The attacker spoofed the CloudFlare IPs we’d issued for Spamhaus as the source in their DNS requests. The open resolvers responded with DNS zone file, generating collectively approximately 75Gbps of attack traffic. The requests were likely approximately 36 bytes long (e.g. dig ANY ripe.net @X.X.X.X +edns=0 +bufsize=4096, where X.X.X.X is replaced with the IP address of an open DNS resolver) and the response was approximately 3,000 bytes, translating to a 100x amplification factor.
It now seems that the attack is being orchestrated by a Dutch hosting company called CyberBunker. As long as it’s not child porn and anything related to terrorism, CyberBunker will host it, including sending spam.  Spamhaus blacklisted CyberBunker earlier in the month.
However, the DDoS attacks have raised concerns that further escalations of the retaliatory attacks could affect banking and email systems. DDoS attacks are typically carried out to extort money from targeted organisations or as a weapon to disrupt organisations or companies in pursuit of ideological, political or personal interests.

HTML 5 Web code weakness allows data dump on computers

The loophole exploits a feature of HTML 5 which defines how websites are made and what they can do.

Developer Feross Aboukhadijeh found the bug and set up a demo page that fills visitors’ hard drives with pictures of cartoon cats.

In one demo, Mr Aboukhadijeh managed to dump one gigabyte of data every 16 seconds onto a vulnerable Macbook.

Clever code

Most major browsers, Chrome, Internet Explorer, Opera and Safari, were found to be vulnerable to the bug, said Mr Aboukhadijeh.

While most websites are currently built using version 4 of the Hyper Text Markup Language (HTML), that code is gradually being superseded by the newer version 5.

One big change brought in with HTML 5 lets websites store more data locally on visitors’ PCs. Safeguards built into the “local storage” specification should limit how much data can be stored. Different browsers allow different limits but all allow at least 2.5 megabytes to be stored.

However, Mr Aboukhadijeh found a way round this cap by creating lots of temporary websites linked to the one a person actually visited. He found that each one of these associated sites was allowed to store up to the limit of data because browser makers had not written code to stop this happening. By endlessly creating new, linked websites the bug can be used to siphon huge amounts of data onto target PCs.

Only Mozilla’s Firefox capped storage at 5MB and was not vulnerable, he found.

“Cleverly coded websites have effectively unlimited storage space on visitor’s computers,” wrote Mr Aboukhadijeh in a blogpost about the bug.

Code to exploit the bug has been released by Mr Aboukhadijeh and he set up a website, called Filldisk that, on vulnerable PCs, dumps lots of images of cats on to the hard drive. So far, no malicious use of the exploits has been observed.

In a bid to solve the problem, bug reports about the exploit have been filed with major browser makers.

 

courtesy: http://www.bbc.co.uk/news/technology-21628622

Apple releases new iPad with 128 GB of storage

apple_ipad_boxApple added a new member to its iPad line on Tuesday, offering a 9.7-inch Retina iPad with 128 gigabytes of storage — doubling the tablet’s previous max capacity.

Everything else about Apple’s tablet is the same, including the dual-core A6X processor, 2 gigabtyes of RAM, and 10 hours of battery life.

 

To account for the added storage space, the 128 GB Wi-Fi model will now cost $799, while the LTE model will cost $929.

To offer some differentiation from its other iPads — which start at $329 for the iPad mini — Apple is targeting the new model primarily at professional users, including those in the architectural and medical fields who handle large files. Gamers, movie fans and avid magazine readers are also likely to appreciate the extra storage space.

The abrupt release marks a shift in how Apple (AAPLFortune 500) is updating the iPad. Instead of rolling out new iPads once a year or so, as it does with iPhones and iPods, Apple is now treating the iPad more like its Mac line, releasing incremental updates to existing models. (Tech blogs began publishing leaked reports about the new iPad two days ago.)

In late 2012, Apple released a fourth-gen iPad with new processor a mere six months after the release of the third-generation Retina iPad. Much like in this most recent update, all other specs remained the same.

Apple has not explicitly announced this strategy shift, so it’s an open question whether or not we’ll see a more significant iPad update this year.

The 128 GB iPad will be available starting on Tuesday, February 5. To top of page

 

courtesy: http://money.cnn.com/2013/01/29/technology/mobile/apple-ipad-128/index.html

 

html meta redirect to different site

However, when using this HTML redirect code, please ensure that you don’t use it to trick the Search Engines, as this could get your web site banned. It is always best to work hard and learn quality ways in which to drive traffic to your web site.

Place the following HTML redirect code between the <HEAD> and </HEAD> tags of your HTML code.

 

 

 

<meta HTTP-EQUIV=”REFRESH” content=”0; url=http://www.yourdomain.com/index.html”>

 

CentOS / Redhat Apache mod_ssl install

Install mod_ssl

yum update

yum install mod ssl

 

Create an SSL Certificate

cd /etc/tls/certs

openssl genrsa -des3 -out apachekey.pem 2048

Generate a Certificate Signing Request (CSR)

Type the following command:
# openssl req -new -key apachekey.pem -out apachekey.csr

Create the Web Server Certificate

You must signed the CSR to create the web server certificate, enter (you can send it to your CA to sign the same). To sign httpserver.csr using your CA:
# openssl ca -in apachekey.csr -out apachecert.pem

Install SSL Certificate

Copy server key and certificates files /etc/tls/http/, enter:
# cp apachecert.pem /etc/tls/http/
# cp apachekey.pem /etc/tls/http/

 
Edit /etc/httpd/conf.d/ssl.conf, enter:
# vi /etc/httpd/conf.d/ssl.conf
Listen to the the HTTPS port, enter:

Listen 10.10.29.68:443

Update it as follows to seed appropriately, enteR:

SSLRandomSeed startup file:/dev/urandom 1024
SSLRandomSeed connect file:/dev/urandom 1024

Update VirtualHost as follows:

 
<VirtualHost www.ajayadas.com:443>
    SSLEngine On
    SSLCertificateFile /etc/tls/http/apachecert.pem
    SSLCertificateKeyFile /etc/tls/http/apachekey.pem
    SSLProtocol All -SSLv2
    SSLCipherSuite HIGH:MEDIUM:!aNULL:+MD5
    DocumentRoot "/var/www/html/ssl"
    ServerName www.ajayadas.com:443
</VirtualHost>

Save and close the file. Make sure /var/www/html/ssl exits, enter:
# mkdir -p /var/www/html/ssl
Edit /etc/httpd/conf/httpd.conf, enter:
# vi /etc/httpd/conf/httpd.conf
Make sure SSL is used for /var/www/html/ssl and set other options for the same, enter:

 
<Directory /var/www/html/ssl>
         SSLRequireSSL
         SSLOptions +StrictRequire
         SSLRequire %{HTTP_HOST} eq "www.ajayadas.com"
         ErrorDocument 403 https://www.ajayadas.com/sslerror.html
</Directory>

Now, you can upload ssl specific php or html pages in /var/www/html/ssl directory and can access them by visiting https://www.nixcraft.com/ url. Do not forgot to restart Apache:
# service httpd restart

 

 

 

WP Twitter Auto Publish Powered By : XYZScripts.com