Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
By Nathan Hauke and David Renardy
How many bytes do you need to take down a web server? The answer might be fewer than you think. Algorithmic complexity (AC) vulnerabilities allow an attacker to submit a small amount of input to an algorithm and cause the target to perform a large amount of work.
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#denial-of-service-with-a-fistful-of-packets-exploiting-algorithmic-complexity-vulnerabilities-16445
Видео Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities канала Black Hat
How many bytes do you need to take down a web server? The answer might be fewer than you think. Algorithmic complexity (AC) vulnerabilities allow an attacker to submit a small amount of input to an algorithm and cause the target to perform a large amount of work.
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#denial-of-service-with-a-fistful-of-packets-exploiting-algorithmic-complexity-vulnerabilities-16445
Видео Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Black Hat USA 2013 - Lessons from Surviving a 300Gbps Denial of Service Attack](https://i.ytimg.com/vi/w04ZAXftQ_Y/default.jpg)
![Hacking Next-Gen ATMs: From Capture to Cashout](https://i.ytimg.com/vi/kno0vDhbb7Y/default.jpg)
![Attacking Encrypted USB Keys the Hard(ware) Way](https://i.ytimg.com/vi/jVKl3GuazEs/default.jpg)
![Command Injection in F5 iRules](https://i.ytimg.com/vi/xMdUKAal3wQ/default.jpg)
![Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets](https://i.ytimg.com/vi/TDk2RId8LFo/default.jpg)
![GDPArrrrr: Using Privacy Laws to Steal Identities](https://i.ytimg.com/vi/meHvy24i1LU/default.jpg)
![I Coded A Checkout Bot To Buy High Demand Products in Seconds!](https://i.ytimg.com/vi/h1vQb9ZIlMo/default.jpg)
![](https://i.ytimg.com/vi/WdCbaWzE7fA/default.jpg)
![48 Dirty Little Secrets Cryptographers Don’t Want You To Know](https://i.ytimg.com/vi/iZa_XKpj9X4/default.jpg)
![CQTools: The New Ultimate Hacking Toolkit](https://i.ytimg.com/vi/MZ0nSO0WOJg/default.jpg)
![What is a packet?](https://i.ytimg.com/vi/BoDuyW4pZmo/default.jpg)
![Exploiting Network Printers](https://i.ytimg.com/vi/DwKzSO4yA_s/default.jpg)
![Hacking a Professional Drone](https://i.ytimg.com/vi/JRVb-xE1zTI/default.jpg)
![AirBnBeware: Short Term Rentals Long Term Pwnage](https://i.ytimg.com/vi/9fAnRkJ6N3s/default.jpg)
![Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware](https://i.ytimg.com/vi/Fi_S2F7ud_g/default.jpg)
![Does Dropping USB Drives in Parking Lots and Other Places Really Work?](https://i.ytimg.com/vi/XJCQBqTmGUU/default.jpg)
![Vulnerability Exploitation In Docker Container Environments](https://i.ytimg.com/vi/77-jaeUKH7c/default.jpg)
![The NSA Playset: A Year Of Toys And Tools](https://i.ytimg.com/vi/AdeMX6l9qNc/default.jpg)
![HTTP/2: The Sequel is Always Worse](https://i.ytimg.com/vi/sI6YS9a7Qyg/default.jpg)
![Zen and the Art of Adversarial Machine Learning](https://i.ytimg.com/vi/tEBwMGCKEso/default.jpg)