Kilokiloai.hashnode.dev·Apr 23, 2024Unexpected DDOS: Blocking China with ipset and iptablesSet up iptables If you already have iptables set up and in use, skip this section and go straight to the ipset section. Create a file where we can declare some rules to use: sudo nano /etc/iptables.firewall.rules Inside there you'll want to paste th...DiscussIptablesDevops
Kilokiloai.hashnode.dev·Apr 22, 2024Analyzing DDoS Attack with Nginx logIn this small post I would like to show a few useful commands to use if someone is experiencing a DDoS attack. In my case, there is an nginx as a front-end server. The access log format looks like this: log_format main '$remote_addr — $remote_user...DiscussIptablesddos
Kilokiloai.hashnode.dev·Apr 22, 2024Sử dụng log Apache để phân tích DDos[root@kiloccnp~]# cat kilo.txt | cut -d ' ' -f 9 | sort | uniq -c | sort -nr 698 404 691 HTTP/1.1" 168 HTTP/1.0" 27 403 [root@kiloccnp~]# grep " 404 " kilo.txt | cut -d ' ' -f 7 | sort | uniq -c | sort -nr 674 / 672 "POS...DiscussIptablesDevSecOps
Kilokiloai.hashnode.dev·Apr 22, 2024IPtables DDoS Protection: The Best Rules to Mitigate DDoS AttacksThere are different ways of building your own anti-DDoS rules for iptables. We will be discussing the most effective iptables DDoS protection methods in this comprehensive tutorial. This guide will teach you how to: Select the best iptables table an...DiscussIptablesDevops
Kilokiloai.hashnode.dev·Apr 22, 2024IPTables Configuration for DDoS ProtectionThe following IPTables configuration will assist with traffic that the DDoS filters cannot fully mitigate. Note: These are a generic ruleset and should be expanded further to suit your specific application. ### IP Tables DDOS Protection Rules ### ##...DiscussIptablesDevops
Kilokiloai.hashnode.dev·Apr 22, 2024Anti DDoS with iptables and ipt_recentIn these days I’ve been attacked with a syn flood plus a GET flood requests.There was ~1600 different IP that compose the botnet that was attacking, so I write some lines of iptables in order to keep the attack under control. Below you can find the e...Discuss·242 readsIptablesDevops
Kilokiloai.hashnode.dev·Apr 22, 2024TCP statesMost of the 11 TCP states are pretty easy to understand and most programmers know what they mean: CLOSED: There is no connection. LISTEN: The local end-point is waiting for a connection request from a remote end-point i.e. a passive open was perfor...DiscussDevops
Prajoti Raneprajotirane.hashnode.dev·Apr 3, 2024Dissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's CoreDissecting the Estonia DDoS Attack: A Technical Expedition into Cybersecurity's Core Introduction: The Estonia DDoS (Distributed Denial of Service) attack of 2007 stands as a pivotal moment in the chronicles of cyber conflict, marking a significant ...Discuss·30 readsddos attacks
Okechukwu Nwaozorokeymeta.hashnode.dev·Feb 2, 2024DDOS attack using GoldenEye in Kali Linux and Termux.Don’t do attack in any government websites* STEP 1 Open Terminal in Kali Linux or Termux in Android Type following command to create and open new Directory mkdir ddos cd ddos STEP 2 Skip this step if you are using Kali Linux In Termux you nee...Discuss·27 readsokeymeta
Sumit Mondalsumit007.hashnode.dev·Dec 22, 2023Safeguarding the Azure Sky: A Dive into DDoS ProtectionIntroduction In the vast and dynamic realm of cloud computing, security is paramount. As businesses migrate their operations to the cloud, ensuring the integrity and availability of their services becomes a critical concern. One of the significant ch...DiscussAzure - TheoryAzure