

A security vendor has turned the tables on malicious hackers by releasing details of a vulnerability in a popular toolkit used to launch distributed denial of service (DDoS) attacks against corporate websites.
The toolkit in question is the infamous Dirt Jumper, which is based on the RussKill application that has become one of the most popular DDoS tools in the World Wide Web’s seedy underground.
Prolexic revealed earlier this week that it had identified a vulnerability within the command and control (C&C) structure of Dirt Jumper, which makes it possible to use open source pen testing tools to access the toolkit’s database and its server-side configuration files.
Scott Hammack, CEO of Prolexic, said that using the information it would be possible for those targeted by DDoS to access the C&C server and put a stop to it.
“It is our duty to share this vulnerability with the security community,” added Hammack.
This latest development comes after a week of high profile attacks on websites, including WikiLeaks, KrebsonSecurity and most recently, RT News.
As well as cracking Dirt Jumper, Prolexic has also revealed information that could help stop hackers using the Pandora DDoS toolkit in their tracks. The Pandora DDoS toolkit, which can be used to launch a variety of DDoS attacks including HTTP Download, HTTP combo, HTTP Min, Max Flood and Socket Connect attacks, made headlines last week when it took out the Brian Kreb’s website.
Prolexic explained:
“The HTTP Combo offers a one-two punch that targets the application and infrastructure layer simultaneously, while the Max Flood attack initiates a flood that contains a 1-million-byte payload within the POST request,”
Pandora, which is the latest edition of the Dirt Jumper family, claims to be so powerful that it can take out the average website using just 10 infected bots. Indeed, according to its creators, they were even able to use Pandora to slow down the Russia’s most popular search engine Yandex to a snail’s pace when they ‘tested’ the kit out.
However, Prolexic revealed that Pandora’s code was “messy”, containing numerous typographical errors:
“Infected bots beacon to the user’s C&C panel with broken GET requests that identify the availability of the bots. In addition, a GET request in the Socket Connect attack is sent as an ‘ET’ request, which is invalid HTTP request. Some web servers such as Apache, however, will interpret the ET request as a GET request and will respond with a valid OK response. Other web servers, such as nginx, will return a Bad Request error message.”
Support our open free content by sharing and engaging with our content and community.
Where Technology Leaders Connect, Share Intelligence & Create Opportunities
SiliconANGLE Media is a recognized leader in digital media innovation serving innovative audiences and brands, bringing together cutting-edge technology, influential content, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — such as those established in Silicon Valley and the New York Stock Exchange (NYSE) — SiliconANGLE Media operates at the intersection of media, technology, and AI. .
Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a powerful ecosystem of industry-leading digital media brands, with a reach of 15+ million elite tech professionals. The company’s new, proprietary theCUBE AI Video cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.