Resource exhaustion is a simple denial of service condition which occurs when the resources necessary to perform an action are entirely consumed, therefore preventing that action from taking place.
Consequences
- Availability: The most common result of resource exhaustion is denial-of-service.
- Access control: In some cases it may be possible to force a system to "fail open" in the event of resource exhaustion.
Exposure period
- Design: Issues in system architecture and protocol design may make systems more subject to resource-exhaustion attacks.
- Implementation: Lack of low level consideration often contributes to the problem.
Platform
- Languages: All
- Platforms: All
Required resources
any
Severity
Low to medium
Likelihood of exploit
Very high
Resource exhaustion issues are generally understood but are far more difficult to successfully prevent. Resources can be exploited simply by ensuring that the target machine must do much more work and consume more resources in order to service a request than the attacker must do to initiate a request.
Prevention of these attacks requires either that the target system:
- either recognizes the attack and denies that user further access for a given amount of time;
- or uniformly throttles all requests in order to make it more difficult to consume resources more quickly than they can again be freed.
The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, he may be able to prevent the user from accessing the server in question.
The second solution is simply difficult to effectively institute - and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.
The final concern that must be discussed about issues of resource exhaustion is that of systems which "fail open." This means that in the event of resource consumption, the system fails in such a way that the state of the system - and possibly the security functionality of the system - is compromised.
A prime example of this can be found in old switches that were vulnerable to "macof" attacks (so named for a tool developed by Dugsong). These attacks flooded a switch with random IP and MAC address combinations, therefore exhausting the switch's cache, which held the information of which port corresponded to which MAC addresses. Once this cache was exhausted, the switch would fail in an insecure way and would begin to act simply as a hub, broadcasting all traffic on all ports and allowing for basic sniffing attacks.
Risk Factors
TBD
Examples
In Java:
class Worker
implements Executor { ...
public void execute(Runnable r)
{ try
{ ...
} catch (InterruptedException ie)
{ // postpone response Thread.currentThread().interrupt();
}
} public Worker(Channel ch, int nworkers)
{ ...
} protected void activate()
{ Runnable loop = new Runnable()
{ public void run()
{ try
{ for (;;)
{ Runnable r = ... r.run();
}
} catch (InterruptedException ie) {...}
}
}; new Thread(loop).start();
} In C/C++: int main(int argc, char *argv[])
{ sock=socket(AF_INET, SOCK_STREAM, 0);
while (1) { newsock=accept(sock, ...);
printf("A connection has been accepted\n");
pid = fork(); }
There are no limits to runnables/forks. Potentially an attacker could cause resource problems very quickly.
This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:
ReplyDelete-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change
Email: onlineghosthacker247@ gmail .com