SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
www.prolexic.com
NTP-AMP: DDoS Amplification Tactics
Highlights from a Prolexic DDoS Threat Advisory
www.prolexic.com
What is DDoS amplification?
• Amplification makes a DDoS attack stronger
• An attacker sends a small message to a third-party
server, pretending to be the target
• The server responds with a much larger message
to the target
• Repeated requests result in a denial of service
attack
– The flood of unwanted traffic keeps the target site too
busy, causing it to crash or respond too slowly to users
www.prolexic.com
Why NTP amplification?
• Network Time Protocol (NTP) is a common
Internet protocol
• Servers use NTP to synchronize computer clocks
• Some versions of NTP are vulnerable to use in
DDoS amplification attacks
• Attackers create lists of vulnerable servers
• A DDoS attack tool called NTP-AMP uses NTP and
amplification lists to create massive denial of
service attacks
www.prolexic.com
NTP attacks: an emerging DDoS trend
www.prolexic.com
Many industries have been targeted
• Finance
• Gaming
• e-Commerce
• Internet
• Media
• Education
• Software-as-a-service (SaaS)
• Security
www.prolexic.com
How NTP-AMP works
• monlist: IP addresses and statistics for the last 600
clients that have asked an NTP server for the time
• The NTP-AMP tool asks an NTP server for its monlist,
while pretending to be the target.
• The NTP server sends its monlist to the target.
• The monlist is big!
– In a worse-case situation, a single 60-byte request
packet could generate a 22,000-byte response
• The attacker may use many NTP servers, but with this
much amplification, fewer are needed
www.prolexic.com
Don’t be a part of an attack: Configure your
NTP servers properly
• Got an NTP
server?
• Run a monlist
query.
• If you get a
response like
this one, it is
imperative that
you change the
server
configuration to
disable this type
of response.
www.prolexic.com
If you are a target of an NTP attack
• NTP-AMP is in active use in DDoS attack campaigns
• Prolexic stops NTP-AMP attacks
• The NTP-AMP Threat Advisory by the Prolexic
Security Engineering and Response Team (PLXsert)
explains how to mitigate NTP-AMP DDoS attacks
– Target mitigation using ACL entries
– NTP-AMP IDS Snort Rule against victim NTP server
www.prolexic.com
Threat Advisory: NTP-AMP DDoS toolkit
• Download the threat advisory, NTP-AMP:
Amplification Tactics and Analysis
• This DDoS threat advisory includes:
– Indicators of the use of the NTP-AMP toolkit
– Analysis of the source code
– Use of monlist as the payload
– The SNORT rule and target mitigation using ACL entries
for attack targets
– Mitigation instructions for vulnerable NTP servers
– Statistics and payloads from two observed NTP
amplification DDoS attack campaigns
www.prolexic.com
About Prolexic (now part of Akamai)
• Prolexic Technologies is the world’s largest and
most trusted provider of DDoS protection and
mitigation services
• Prolexic has successfully stopped DDoS attacks for
more than a decade
• Our global DDoS mitigation network and 24/7
security operations center (SOC) can stop even the
largest attacks that exceed the capabilities of other
DDoS mitigation service providers

Contenu connexe

Dernier

zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
zukhrafshabbir
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...
AnaBeatriz125525
 

Dernier (20)

8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical TrialsSalesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
Salesforce in Life Sciences - Best Ways to Leverage The CRM for Clinical Trials
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
The Ultimate Guide to IPTV App Development Process_ Step-By-Step Instructions
The Ultimate Guide to IPTV App Development Process_ Step-By-Step InstructionsThe Ultimate Guide to IPTV App Development Process_ Step-By-Step Instructions
The Ultimate Guide to IPTV App Development Process_ Step-By-Step Instructions
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
India’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdfIndia’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdf
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdf
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Do s & d dos attacks ntp amplification cyber threat prolexic slideshow

  • 1. www.prolexic.com NTP-AMP: DDoS Amplification Tactics Highlights from a Prolexic DDoS Threat Advisory
  • 2. www.prolexic.com What is DDoS amplification? • Amplification makes a DDoS attack stronger • An attacker sends a small message to a third-party server, pretending to be the target • The server responds with a much larger message to the target • Repeated requests result in a denial of service attack – The flood of unwanted traffic keeps the target site too busy, causing it to crash or respond too slowly to users
  • 3. www.prolexic.com Why NTP amplification? • Network Time Protocol (NTP) is a common Internet protocol • Servers use NTP to synchronize computer clocks • Some versions of NTP are vulnerable to use in DDoS amplification attacks • Attackers create lists of vulnerable servers • A DDoS attack tool called NTP-AMP uses NTP and amplification lists to create massive denial of service attacks
  • 4. www.prolexic.com NTP attacks: an emerging DDoS trend
  • 5. www.prolexic.com Many industries have been targeted • Finance • Gaming • e-Commerce • Internet • Media • Education • Software-as-a-service (SaaS) • Security
  • 6. www.prolexic.com How NTP-AMP works • monlist: IP addresses and statistics for the last 600 clients that have asked an NTP server for the time • The NTP-AMP tool asks an NTP server for its monlist, while pretending to be the target. • The NTP server sends its monlist to the target. • The monlist is big! – In a worse-case situation, a single 60-byte request packet could generate a 22,000-byte response • The attacker may use many NTP servers, but with this much amplification, fewer are needed
  • 7. www.prolexic.com Don’t be a part of an attack: Configure your NTP servers properly • Got an NTP server? • Run a monlist query. • If you get a response like this one, it is imperative that you change the server configuration to disable this type of response.
  • 8. www.prolexic.com If you are a target of an NTP attack • NTP-AMP is in active use in DDoS attack campaigns • Prolexic stops NTP-AMP attacks • The NTP-AMP Threat Advisory by the Prolexic Security Engineering and Response Team (PLXsert) explains how to mitigate NTP-AMP DDoS attacks – Target mitigation using ACL entries – NTP-AMP IDS Snort Rule against victim NTP server
  • 9. www.prolexic.com Threat Advisory: NTP-AMP DDoS toolkit • Download the threat advisory, NTP-AMP: Amplification Tactics and Analysis • This DDoS threat advisory includes: – Indicators of the use of the NTP-AMP toolkit – Analysis of the source code – Use of monlist as the payload – The SNORT rule and target mitigation using ACL entries for attack targets – Mitigation instructions for vulnerable NTP servers – Statistics and payloads from two observed NTP amplification DDoS attack campaigns
  • 10. www.prolexic.com About Prolexic (now part of Akamai) • Prolexic Technologies is the world’s largest and most trusted provider of DDoS protection and mitigation services • Prolexic has successfully stopped DDoS attacks for more than a decade • Our global DDoS mitigation network and 24/7 security operations center (SOC) can stop even the largest attacks that exceed the capabilities of other DDoS mitigation service providers