Last week's denial of service attack agains the Department of Justice (justice.gov), the FBI (fbi.gov) and other sites didn't just rely on Anonymous's favorite tool Low Orbit Ion Canon. Instead, a new method was employed to recruit denial of service clients.
IMPORTANT: The script will start running as soon as the user vists the page.You do not have to press the fire button.
var requestedCtrNode = document.getElementById(requestedCtr),
succeededCtrNode = document.getElementById(succeededCtr),
failedCtrNode = document.getElementById(failedCtr),
targetURLNode = document.getElementById(targetURL)
// requests hash table, may come in handy later
Originally, I figured the attack may take advantage of XMLHTTPRequest.Instead, the code takes a simpler route. It just changes an image URL toa URL on the attacked page. I suspect that this method is more reliable asit does not require the client to implement XMLHTTPrequest Level 2 orXDomainrequest but should work with pretty much any client.
It will not necessarily retrieve an actual image,but just whatever URL was targeted, followed by an id parameter and amsg (which is also set by the user). This format should make it prettyeasy to filter the attacks at a web application firewall. Even other contentsensitive firewalls should be able to deal with this.
HTTP/1.1 200 8395
In order to prevent crashing the browser, the script will limit the numberof outstanding requests.The script attempts to send 5,000 requests per second. I tested it directingmy requests to a lab web server across a pretty slow VPN connection. It managed to create about 5 requests per second. The referer for the request will be the URL of the attack page. The user's user agent is not altered.
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.