57

Can a DDoS attack reveal any information or be used to mount a hack? My understanding is that the whole point of DDoS or DoS is to consume all of the resources/overload the server causing it to crash. And that being the only reason to do a DDoS.

I have heard that DDoS is used to get information. Is that true or totally false?

Anders
  • 64,406
  • 24
  • 178
  • 215
KosugiNinja
  • 689
  • 1
  • 5
  • 6
  • 17
    A DoS attack does bring up edge cases (a crash being a just-over-the-edge case), which should not but *may* reveal information not accessible otherwise. – Bergi Aug 10 '16 at 10:59
  • 4
    This is theoretical but if you ddos a server, the time it takes to handle a request become mesurable over a network, and if you know that the server is checking password character by character you can then know if the first characters of the password you tried are the rigth one because the server now takes longer to answer. – Pierre.Sassoulas Aug 10 '16 at 15:57
  • 16
    @Pierre.Sassoulas Hopefully the server uses constant-time comparisons to avoid leaking information... wait, who am I kidding? – Thomas Aug 10 '16 at 20:39
  • Yes, theoretical ...but it could happen :) – Pierre.Sassoulas Aug 11 '16 at 06:36
  • 4
    You're not worried about the [2016 Australian Census](http://www.9news.com.au/national/2016/08/10/17/37/census-attack-sets-back-e-voting) are you? :P – Matt Lyons-Wood Aug 11 '16 at 13:43
  • Since your question seems not limited to remote attacks: Does [MAC flooding](https://en.wikipedia.org/wiki/MAC_flooding) count? – Dubu Aug 11 '16 at 16:58
  • 2
    Why do you limit this to DDoS? The question seems to apply to DoS in general. – paparazzo Aug 12 '16 at 17:32
  • Yes, it reveals the amount of resources the server has (approximately). – user253751 Aug 15 '16 at 06:52
  • @Paparazzi DoS includes other, more sophiscated attacks than 'hammer the server until it fails' - ping of death, for an old example. While it's certainly possible to send enough traffic from one location to crash it, saying 'DDoS' makes it clear that you're talking about brute force traffic. – SomeoneSomewhereSupportsMonica Aug 15 '16 at 09:13
  • @SomeoneSomewhere OK. If the question is about gaining information what is the purpose of limiting to DDoS? – paparazzo Aug 15 '16 at 09:16
  • @Paparazzi Because if you include all attacks that deny service, then the post would probably be (rightfully) closed for being 'too broad'. – SomeoneSomewhereSupportsMonica Aug 15 '16 at 09:21
  • @SomeoneSomewhere Really Distributed would be the difference in getting closed? Ironic this is about denial of service. – paparazzo Aug 15 '16 at 09:26
  • DDoS is generally considered *one specific attack* - point lots of traffic, from lots of sources, at one server. DoS is a big class of attacks that stop things working - it's asking "Is there anything I can do that both takes down a service and tells me stuff". That's a massive amount of info. – SomeoneSomewhereSupportsMonica Aug 15 '16 at 09:29

11 Answers11

84

A DDoS will certainly give an attacker information about response times, load capability and routing.

It may also give information about how incidents are handled internally and externally, as well as how they are reported to the public.

But this is not what the main uses are.

Generally the two key reasons for DDoS are to:

  • take a service or website offline
  • distract from a wider attack, exploit or intrusion

The first is well known, very popular, and is relatively straightforward to carry out, with the only defence against a large attack being a high volume DDoS mitigation service.

The second is more rarely used, but is being seen as a part of an attacker's toolset. Loading the incident response team can make it harder for them to detect an intrusion, can hide the real reason for the attack, and can hide evidence of an intrusion in amongst large numbers of log entries from the DDoS.

Rory Alsop
  • 61,367
  • 12
  • 115
  • 320
  • 5
    I could easily be misremembering or attributing to fiction but it seems as though I've read that DDoS attacks are sometimes the beginning of cracking a system. For instance, DDoS some server forcing reboot and then attack some weak point before all services have started. – Dean MacGregor Aug 10 '16 at 13:59
  • 1
    I guess that could theoretically be true - not sure how possible in practice :-) – Rory Alsop Aug 10 '16 at 14:00
  • 3
    @DeanMacGregor Theoretically yes, but practically its unlikely. Any load balancer will only redirect to a fully booted node, a firewall that's down won't route anything anywere etc. If you have a single, badly configured application server thats not secure without a special filter (like mod_security) but works without it, then it _may be_ possible, but that is really unusual. – Sebb Aug 10 '16 at 14:58
  • 10
    @DeanMacGregor, that was popular back in the wild-west days of IRC: since authentication was strapped on to IRC well after the protocol was developed, channel and user names were a matter of "first come, first served". There were a number of attacks that involved knocking a server or a user offline, then connecting to another part of the network to make your use of the name the oldest. – Mark Aug 10 '16 at 18:25
  • 2
    @DeanMacGregor yes; here is an account of someone finding a discussion forum login cookies were made with a weak random number generator, seeded by the time the service started, and them crashing the server with a DoS to gain knowledge of the time it restarted and therefore be able to predict the random numbers protecting login cookies and take over other people's sessions: https://news.ycombinator.com/item?id=639976 – TessellatingHeckler Aug 12 '16 at 17:35
  • It could be used in combination with other attacks and vulnerabilities as a path to gain more information. IP spoofing is a way to gain access to information that is secured to internal users. Much of the time, the IP being spoofed has to be disabled so it doesn't return RCT saying "Hey this data isn't from me". disabling would be done by some sort of DOS attack. – stephenbayer Aug 12 '16 at 19:50
14

A full answer would be depending on the attack and what would be attacked, so I will keep it general.

A DoS can leak information as a side-effect. In earlier times switches were used in networks to prevent machines to listen to the communication between 2 other machines. Due to a design problem you could turn it into a big collision domain again by launching a DoS attack against the switch and you can listen to any communication again. Explanation of the attack: Switches learn which machine is connected to which port. When a machine sends a packet to another machine the switch looks up in his memory at which port this machine is and forwards the traffic to only this port. A machine on another port wouldn't see the traffic. A problem arises when there are more machines on the network then what would fit in the memory of the switch. Common behaviors are:

  • The would send all traffic to all ports
  • The switch would stop learning new machines
  • The switch would forget the oldest machines

Especially common were the first type. A attacker would let his machine to pretend to have a hugh amount of machines to be at this port by DoSing it with announcement-broadcasts.

Another attack related to DoS is a security downgrade attack. You have a system consisting of 2 sub-systems, A and B. B is used by A to do additional security checks. If B doesn't respond in time, A would skip this check and consider it successfull. If the attacker can DoS system B he has an easier game because he only needs to pass the security checks on system A. Some systems are designed this way because availibility of system A is important and nobody thought some attacker might DoS system B or would accept the risk. I can't give you the details of an actual attack but some anti-spam blacklists work this way.

It is also known that some advanced groups/organizations launch (D)DoS attacks to distract from their real attack by attracting the focus of the security staff on the target of the DDoS or hide the attack traffic between the DDoS traffic.

Another option is that you need that amount of traffic but don't need to (D)DoS it. For example some attacks on SSL require enough packets to recover/manipulate information. Here the DoS would be a side effect of the amount of traffic.

H. Idden
  • 2,988
  • 1
  • 10
  • 19
  • "In earlier times switches where used in networks to prevent machines to listen to the communication between 2 other machines." - I would hope that wasn't the intention, just a somewhat handy side effect. MAC address spoofing will also help you listen to the communication between 2 other machines. – user253751 Aug 11 '16 at 04:27
  • @immibis you are right, but many didn't think about MAC address spoofing. So it was a common myth that you can't eavesdrop a network when using a switch instead of a hub and it was regularly told as security meassurement. Similar that a modem or subnet is a firewall replacement because of NAT (IPv6 doesn't have NAT and will allow un-firewalled access to those devices or UDP source spoofing is possible with most NAT-devices) or that it is enough to escape quotes on userinput on websites to be safe but this still allows certain SQL-injection attacks (why not use parameterized queries?) or XSS. – H. Idden Aug 11 '16 at 10:26
  • @H.Idden: When people say "eavesdrop", they're referring to a passive attack. The switch makes that impossible. The attack is not prevented, but it now requires an active component (which additionally makes it much easier to detect and trace the culprit) – Ben Voigt Aug 12 '16 at 20:17
  • @BenVoigt Even if you might be right by exact word, people would draw the wrong conclusions from it (that their network is safe from others being able to capture the traffic between other machines). Even today about only enterprise network devices (>1000$) have monitoring/counter meassures to MAC flooding attacks. – H. Idden Aug 12 '16 at 21:58
10

Identify shared resources

A Denial of Service attack, distributed or not, can be used to successfully identify machines which share resources. If you want to hack a service, you can launch an attack against it, while monitoring other services. If those also disappear, it is likely that they are hosted on the same machine. These other services may be more prone to hacking, and can be used as a "crowbar" to gain access to the service you want.

Hidden services

This can be devastating when used against hidden services in the Tor network. If you have reasons to believe that a certain individual is hosting a hidden service, you can test this by launching an attack against an open service on the same hardware or in the same data center. If the hidden service goes down, you may have confirmed that your guess is correct, and the identity behind the hidden service has been compromised.

Each time you test this, you will get one sample, which may be a false positive. Doing it enough times at random intervals, you can increase the probability of being right.

pipe
  • 204
  • 1
  • 8
3

It is possible to use a DDOS attack to gain information. In addition to the answers by Rory Alsop and H. Idden which focus on gaining infrastructure information or overloading the incident response team so other attacks stay undetected longer, there are a few other possibilities.

Auto Scale Applications - When working with an application platform that auto scales a DDOS attack may use the fact that they auto scale to do something. This would have to be in concert with some other kind of attack or information, but the general idea is that if you know enough to exploit the "reboot" process you could use DDOS to force a new server online witch would go through the reboot process, allowing your exploit. It's important to note that this is in addition to an already existing security problem. It's just the tool by which the totally different exploit is brought online (or maybe tested). A sample I can think of is a Production server hosting it's code base in a public github repo, when scales pulls new code into the server, then starts. You could add bad code to that github repo (if not managed correctly), force a restart and have your exploit.

First come First served applications - There are some applications that are "first come first serve" in some part of their process. IRC (from comments) is an example but there are others. Any service that reserves something for a user on a first come first served approach, can be exploited via DDOS. Either by taking up all the slots till a specific person get's theirs, or by forcing a reboot and getting anther chance at "slots" after the restart. These are pretty common, and while a service that uses this for authentication is a bit odd, it's not unheard of. In fact licencing services do this all the time. First user with a licence of "ABC" is the qualified user of ABC. If that data is lost after a reboot then DDOS could cause that reboot, and get their foot in the door.

Startup Vulnerabilities - I have seen, quite a few times where a server boot resulted in services being "left on" just in case. For example , let's leave SSH passwords on after reboot then turn them off after a couple of hours just in case we need emergency access. Or, FTP is on for 30 mins after reboot. This is more common on network appliances. Things like "insecure wifi access for the first 2 mins" or "anything can upload anything for 2 mins". Usually this is part of an upgrade/update mechanism. For example a Cisco router may accept any TFTP data it finds after reboot. Some computers will listen for ANY netboot server at restart. DDOS can kick off the restart and allow your "bad code" a way in.

In essence, a DDOS by it's self can tell you some things, but usually only stuff that is useless on it's own. A DDOS in conjunction with other attack vectors can be extremely effective.

Note The methods used here would work in a lab, but there low hanging fruit for a security team (or even just regular IT). While they do exist in the wild an attacker would have to have gained access/knowledge of internals way beyond that of someone just doing a DDOS.

coteyr
  • 1,506
  • 8
  • 12
2

A real world example of this happening is with Steam. They experienced an DoS attack on christmas day. In response to that they changed the caching rules of the steam service, so customers could still access the store page. Unfortunately, they ended up making a configuration error, which sometimes caused users to see the personal information of other users.

Systems sometimes have unexpected behavior under heavy system load, which can lead to security vulnerabilities. Its a possibility for hackers to exploit this, but they are unlikely able to plan for this, and the exploit is likely unpredictable. They also have to deal with the fact that the server is probably slow to respond due to the heavy load.

John Smith
  • 74
  • 3
2

A DDOS attack could exploit a vulnerability

In theory a DDOS attack could not only distract from an exploit as mentioned in another answer, but it could also be combined with one.

Consider the Heartbleed bug, that returned information when a server was contacted in a particular way.

One could increase the information gained from the server by contacting the server in a DDOS attack and collecting the information that was released in this way.

Dennis Jaheruddin
  • 1,715
  • 11
  • 17
1

Forcing the Server Boot Time

One thing that has been mentioned tangentially in the comments, but not addressed in any of the other quite excellent answers is that it can occasionally be useful to know when an application/server booted up. For example, certain horribly insecure random number generators (which should never be used for security related tasks, but invariably are every now and again) use the system time as their "random" seed.

With that being the case, if you can deduce when the RNG was seeded (preferably within a couple of minutes of accuracy) and have some samples of generator output, it is reasonably trivial to find the seed and rebuild the RNG state to predict future tokens. Now, ordinarily a server should not expose it's start time (though again, some invariably do), however if a DDoS attack can be used to force a server reboot then you've gained knowledge of the server start time.

This can lead to a variety of token based attacks like session hijacking.

Aurand
  • 171
  • 1
  • 3
0

It may be fixed but I know in the early days of Group Policy one exploit was to overload the Group Policy server and in some configurations the local policy would be applied. So we would configure local policy as minimal. You could only use the denial as an exploit the server policy reduced authority. I know I don't have all the terms correct - it has been a while since I did Group Policy admin.

Let say you had compromised a router but that router was not getting the traffic you wanted. You could do a DoS on a good router to hopefully get traffic to the hack router.

paparazzo
  • 181
  • 7
0

I assume that DoS attack can be used alongside with race-condition kind of exploit. When server is heavily loaded, exploit will be easier to use.

However, DoS-attack alone can yield some info, as it was shown in previous answers - about routing, response time and internal incident handling.

Vilican
  • 2,703
  • 8
  • 21
  • 35
0

What about a timing attack? This has been discussed as a possible security vulnerability in Java, Python, probably many others, and actually might appear to be a DOS attack.

When various libraries check for equality, generally they ready byte by byte and compare, returning false if not matching - if something like that is used in checking password/cookie, theoretically they can time the longest request, and assume it got farther through the comparison.

NoBugs
  • 101
  • 2
-3

It's usually not incredibly intrusive. It depends on the ports that are open and the packets that are sent. DDoS can come from people bruteforcing your server's details and databases, especially over LAN, and can imply a discreet bruteforce attack in some cases. A typical web server is hard to hack, I host web and for video games. Ask a professional, or I'd assume it's an unavoidable vulnerability.

schroeder
  • 123,438
  • 55
  • 284
  • 319