When the attack ceases the application often never fully recovers with the CPU remaining around 70% and threads fluctuating between 10-14. Sustained attacking will cause total system resource starvation. Again, using the web proxy port, we now issue a request to the SMTP proxy using the command 'GET 127.0.0.1:25\r\n\r\n' sent to TCP port 6588. Keeping the connection open and sending this request at a rate of 1 every second we see:
Resources are never regained when this attack ceases. Sustained attacking will cause total system resource starvation. Once more using the web proxy port, we now issue a request to the FTP proxy using the command 'GET 127.0.0.1:21\r\n\r\n' sent to TCP port 6588. Keeping the connection open and sending this request at a rate of 1 every second we see:
Resources are never regained when this attack ceases. Sustained attacking will cause total system resource starvation. Now using the FTP proxy port we issue the command 'OPEN test@127.0.0.1' to port 21. Keeping the connection open and waiting for responses to each request, sending this request at a rate of 1 every second we see:
All resources and CPU recover when the attack ceases but sustained attacking will cause total system resource starvation. Lastly using the SOCKS proxy we issue the command '\x04\x01\x04\x38\x7f\x00\x00\x01abcd\x00' to the SOCKS port of 1080. This is a SOCKS CONNECT request to port 1080 on 127.0.0.1. Keeping the connection open and sending this request at a rate of 1 every second we see:
All resources and CPU recover when the attack ceases but sustained attacking will cause total system resource starvation. It is conceivable that other misconfigured proxy servers suffer from similar loopback connection problems. Related Articles | |||||||||||||||||||||||||||||||||||||||||||||
|