DoS:how to takedown websites for fun& profit

You can look for DoS vulnerabilities for any reason such as for bug bounty program,delete privacy infringement site,phishing site or the classic Lulz:)

I don’t encourage illegal hacking so the techniques on this blog are for educational purposes only.All the findings were reported to bug bounty programs and fixed.for obvious reasons the programs won’t be named.

1.Long password 

Sending long password on signup of two sites brought down the sites.

Fix:having password length limit 

Bounties:$500 ,$250

2.cache poisoning 

A site running on drupal 7 with misconfigured WAF(cloud flare) could be ddosed by sending alot(50+ requests) on path ?id=11


After this finding I went to look for such misconfigurations which netted over 20 reports in 2 months

Another instance of cache poisoning was via a header with malformed value such as : x-forwarded-port: xxx12.

3.wordpress CVE-2018-6389

Running the script at  https://github.com/quitten/doser.py  could bring down Wordpress sites running with loaded js and css scripts.


4.API limit 

Some API endpoint with path /limit=100 that returned 100 objects could be taken down by using larger characters than 100.inputting 1000000 was enough to DoS the site.

5.SQLi

You read it right,sqli can be critical and why do you need it for DoS? I found a limited sqli where I couldn’t retrieve data due to permissions issue.I needed impact to report so I had to use the famous sleep command.

6.Rce 

Using command injection to DoS the site 

7.Redos 

Sending malformed regex  to query functions could bring down sites.

8.Large pixel picture 

I uploaded a modified image with large pixel on my profile in some site which could produce a 500 error for anyone who viewed my profile.

9.Bonus:Notes Android app on xiaomi 

Saving more than 15k characters in xiaomi phones notes apps could crash the app making it unusable till clearing of app’s data.

The bug was fixed with limited characters and truncating extra characters.

After performing a DoS confirm the validity by using “ is it down” websites or try loading the sites via different ip address to make sure you’re not blocked by WAF.you can also use online web based proxies 


Comments

Popular posts from this blog

SOME BUGS

Not A Guide to hacking betting sites

Taking a Delorean car back to the future:Time related attacks