Testing for DoS vulnerabilities
There were notable recent incidents that are worth mentioning to illustrate the power and reach of such kinds of attacks. They are listed by traffic volume, and the references are in the Further reading section at the end of the chapter:
- The attack against Google Cloud reached 2.54 Tbps in 2017, but it was only disclosed to the public three years later in 2020. The attacks sent forged packets to web servers pretending they were being sent by Google servers. All the responses to such packets were sent to Google, which caused this volume.
- In February 2020, one AWS customer’s infrastructure was the target of a 2.3 Tbps DDoS attack. The specialized company service, AWS Shield, managed to absorb the “tsunami,” which protected the customer’s assets. By leveraging Connectionless Directory Access Protocol (CLDAP), the criminals dispatched huge amounts of packets toward publicly available Lightweight Directory Access Protocol...