DEF CON 32 - Practical Exploitation of DoS in Bug Bounty - Roni Lupin Carta

Поделиться
HTML-код
  • Опубликовано: 9 фев 2025
  • The talk "Practical Exploitation of DoS in Bug Bounty" explains methods for identifying and exploiting Denial of Service (DoS) vulnerabilities in bug bounty programs. Starting with an overview of DoS attacks and their impact, we will highlight how these attacks disrupt services by overwhelming resources or exploiting flaws. The talk covers various DoS attack types, including N+1 errors, in-depth GraphQL crashing, and Cache Poisoning, with real-world examples demonstrating their effects.
    We will then detail practical techniques for discovering DoS vulnerabilities. This includes automated scanning tools, manual testing methods, and understanding the target system's architecture.
    N+1 errors occur when an application makes redundant database queries, significantly impacting performance. Attackers can exploit this by triggering numerous unnecessary queries, causing severe slowdowns or crashes. GraphQL, a query language for APIs, can be vulnerable to complex queries that consume excessive resources, leading to server crashes. We will show how to craft such queries and the resulting impact. Cache Poisoning involves manipulating cached data to serve malicious or incorrect content, which can disrupt services or degrade performance. We will explore techniques to poison caches and demonstrate the potential consequences.
    Additionally, the talk emphasizes the importance of responsibly reporting discovered vulnerabilities to bug bounty programs. Best practices are shared for effectively communicating findings and ensuring timely mitigation. Of course, there are some fails during this path, and those are going to be covered too.
    The session wraps up by stressing the need for continuous learning and staying updated on the latest trends in DoS attack vectors and mitigation strategies

Комментарии • 8

  • @jonathanfillion7890
    @jonathanfillion7890 3 месяца назад +4

    I'm glad the npm DOS was re-evaludated Lupin. Congrats to the NPM team as well.

  • @DemoncyberSec
    @DemoncyberSec 3 месяца назад +5

    That login page ddos is awesome bro loved it lupin bro you are always the best

  • @anuzravat
    @anuzravat 3 месяца назад +3

    underated PPT

    • @anuzravat
      @anuzravat 3 месяца назад +2

      good work idnama

  • @gentelman8179
    @gentelman8179 2 месяца назад

    The extension is not yet released

  • @fevicoI
    @fevicoI 3 месяца назад +3

    His accent is so irritating.