DoS:how to takedown websites for fun& profit
You can look for DoS vulnerabilities for any reason such as for bug bounty program,delete privacy infringement site,phishing site or the classic Lulz:)
I don’t encourage illegal hacking so the techniques on this blog are for educational purposes only.All the findings were reported to bug bounty programs and fixed.for obvious reasons the programs won’t be named.
1.Long password
Sending long password on signup of two sites brought down the sites.
Fix:having password length limit
Bounties:$500 ,$250
2.cache poisoning
A site running on drupal 7 with misconfigured WAF(cloud flare) could be ddosed by sending alot(50+ requests) on path ?id=11
After this finding I went to look for such misconfigurations which netted over 20 reports in 2 months
Another instance of cache poisoning was via a header with malformed value such as : x-forwarded-port: xxx12.
3.wordpress CVE-2018-6389
Running the script at https://github.com/quitten/doser.py could bring down Wordpress sites running with loaded js and css scripts.
4.API limit
Some API endpoint with path /limit=100 that returned 100 objects could be taken down by using larger characters than 100.inputting 1000000 was enough to DoS the site.
5.SQLi
You read it right,sqli can be critical and why do you need it for DoS? I found a limited sqli where I couldn’t retrieve data due to permissions issue.I needed impact to report so I had to use the famous sleep command.
6.Rce
Using command injection to DoS the site
7.Redos
Sending malformed regex to query functions could bring down sites.
8.Large pixel picture
I uploaded a modified image with large pixel on my profile in some site which could produce a 500 error for anyone who viewed my profile.
9.Bonus:Notes Android app on xiaomi
Saving more than 15k characters in xiaomi phones notes apps could crash the app making it unusable till clearing of app’s data.
The bug was fixed with limited characters and truncating extra characters.
After performing a DoS confirm the validity by using “ is it down” websites or try loading the sites via different ip address to make sure you’re not blocked by WAF.you can also use online web based proxies
Comments
Post a Comment