DDoS | basic Python script that accepts a website 's url in string
kandi X-RAY | DDoS Summary
kandi X-RAY | DDoS Summary
This is a basic Python script that accepts a website’s url in string format to initiate a DDoS attack. For educational purposes only. To run this script, you should be running Python >= 3.2.0. To install the dependencies: pip install futures pip install urllib. Warning: This script may crash your computer as it is multi-threaded.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Attack a given URL .
DDoS Key Features
DDoS Examples and Code Snippets
Community Discussions
Trending Discussions on DDoS
QUESTION
I built a random forest by RandomForestClassifier and plot the decision trees. What does the parameter "value" (pointed by red arrows) mean? And why the sum of two numbers in the [] doesn't equal to the number of "samples"? I saw some other examples, the sum of two numbers in the [] equals to the number of "samples". Why in my case, it doesn't?
...ANSWER
Answered 2022-Mar-28 at 09:03Nice catch.
Although undocumented, this is due to the bootstrap sampling taking place by default in a Random Forest model (see my answer in Why is Random Forest with a single tree much better than a Decision Tree classifier? for more on the RF algorithm details and its difference from a mere "bunch" of decision trees).
Let's see an example with the iris
data:
QUESTION
ok, so I'm new to web scraping. I followed a tutorial I found on the internet and it works a treat for a specific website. so I tried to change it up to work for another site. I think I have figured out the headers as I get a 200 response, But when I'm targeting a div to pull its value I am just met with null. So my question is am I doing something wrong here? I have tried to follow other tuts to see if it would answer my question, But I guess because I am new I'm not really sure what to look for?!
EDIT: I should be a bit more specific. so as you can see in my code, I am trying to scrape data from Chaos cards website, I think I have the search function sorted (could be wrong?) but what I'm trying to achieve is when I inspect the page I would like to take the data from
Out of stock
Specifically the "Out of stock" part. as I know this div will contain "in stock" assuming it is. But when I target this div I am just met with null
All I am trying to do is set up a scrapper that when a user in discord types a specific product it will search the website, if it is in stock or not, it will return saying in stock or not in stock. But for now I'm trying to take baby steps, and just get it to firstly print the data I'm after
CODE
...ANSWER
Answered 2022-Jan-30 at 00:29You could try turning the source code of the website into a string and do one of the following:
QUESTION
REF: https://portswigger.net/daily-swig/ip-spoofing-bug-leaves-django-rest-applications-open-to-ddos-password-cracking-attacks Reported Date: Jan 11 2022
- Other than providing captcha, what security measure should be taken?
- Which version of Django and/or Python is affected by IP Spoofing?
ANSWER
Answered 2022-Jan-12 at 22:10I did some research into the link you shared, Django's source and Django REST Framework's source.
Bare-bones Django is not vulnerable to this, since it doesn't uses X-Forwarded-For
, and neither is Python.
Virtually all versions of Django REST Framework are vulnerable, since this commit 9 years ago added the HTTP_X_FORWARDED_FOR
check: https://github.com/encode/django-rest-framework/blob/d18d32669ac47178f26409f149160dc2c0c5359c/rest_framework/throttling.py#L155
For measures you can take to avoid this, since a patch is not yet available, you could implement your own ratelimitter, and replace get_ident
to only use REMOTE_ADDR
.
If your Djando REST Framework application is behind a proxy, you might not be vulnerable to this.
QUESTION
I am developing a C++ application, where the program run endlessly, allocating and freeing millions of strings (char*) over time. And RAM usage is a serious consideration in the program. This results in RAM usage getting higher and higher over time. I think the problem is heap fragmentation. And I really need to find a solution.
You can see in the image, after millions of allocation and freeing in the program, the usage is just increasing. And the way I am testing it, I know for a fact that the data it stores is not increasing. I can guess that you will ask, "How are you sure of that?", "How are you sure it's not just a memory leak?", Well.
This test run much longer. I run malloc_trim(0)
, whenever possible in my program. And it seems, application can finally return the unused memory to the OS, and it goes almost to zero (the actual data size my program has currently). This implies the problem is not a memory leak. But I can't rely on this behavior, the allocation and freeing pattern of my program is random, what if it never releases the memory ?
- I said memory pools are a bad idea for this project in the title. Of course I don't have absolute knowledge. But the strings I am allocating can be anything between 30-4000 bytes. Which makes many optimizations and clever ideas much harder. Memory pools are one of them.
- I am using
GCC 11 / G++ 11
as a compiler. If some old versions have bad allocators. I shouldn't have that problem. - How am I getting memory usage ? Python
psutil
module.proc.memory_full_info()[0]
, which gives meRSS
. - Of course, you don't know the details of my program. It is still a valid question, if this is indeed because of heap fragmentation. Well what I can say is, I am keeping a up to date information about how many allocations and frees took place. And I know the element counts of every container in my program. But if you still have some ideas about the causes of the problem, I am open to suggestions.
- I can't just allocate, say 4096 bytes for all the strings so it would become easier to optimize. That's the opposite I am trying to do.
So my question is, what do programmers do(what should I do), in an application where millions of alloc's and free's take place over time, and they are of different sizes so memory pools are hard to use efficiently. I can't change what the program does, I can only change implementation details.
Bounty Edit: When trying to utilize memory pools, isn't it possible to make multiple of them, to the extent that there is a pool for every possible byte count ? For example my strings can be something in between 30-4000 bytes. So couldn't somebody make 4000 - 30 + 1
, 3971 memory pools, for each and every possible allocation size of the program. Isn't this applicable ? All pools could start small (no not lose much memory), then enlarge, in a balance between performance and memory. I am not trying to make a use of memory pool's ability to reserve big spaces beforehand. I am just trying to effectively reuse freed space, because of frequent alloc's and free's.
Last edit: It turns out that, the memory growth appearing in the graphs, was actually from a http request queue in my program. I failed to see that hundreds of thousands of tests that I did, bloated this queue (something like webhook). And the reasonable explanation of figure 2 is, I finally get DDOS banned from the server (or can't open a connection anymore for some reason), the queue emptied, and the RAM issue resolved. So anyone reading this question later in the future, consider every possibility. It would have never crossed my mind that it was something like this. Not a memory leak, but an implementation detail. Still I think @Hajo Kirchhoff deserves the bounty, his answer was really enlightening.
...ANSWER
Answered 2022-Jan-09 at 12:25If everything really is/works as you say it does and there is no bug you have not yet found, then try this:
malloc and other memory allocation usually uses chunks of 16 bytes anyway, even if the actual requested size is smaller than 16 bytes. So you only need 4000/16 - 30/16 ~ 250 different memory pools.
QUESTION
I want to block exact cookie value like PHPSESSID in Nginx. Does this possible? My site under DDoS but I can't block by IP due to shared addresses. Attackers use same value of Cookies so I try to block by cookie value.
Thanks
...ANSWER
Answered 2021-Dec-02 at 20:54server {
...
if ($cookie_PHPSESSID = "XXXXXXXXXXXX") {
return 403;
}
}
QUESTION
I am trying to fit my data using my feature selection but whenever I try I get this error
...ANSWER
Answered 2021-Nov-29 at 22:40This might not be the answer you want to hear, but it has some validity.
A good practice when trying to do almost any type of training or data analysis is to first clean the data. One of those steps can include removing or treating 'Nan', 'infinity', or otherwise out-of-place outliers.
There is a multitude of ways to do this, but for your case, I would suggest doing all of these to start with:
- Remove rows with Nan values.
- Remove rows with infinity values.
- Move all values so that they are within the float64 data size, or remove rows that contain numbers outside of the float64 data size.
- Remove columns that have an excessively large range.
Here is a function I use often to first inspect data for cleaning.
QUESTION
I get this error when trying to make a HTTP GET on https://bot.whatismyipaddress.com/ My code:
...ANSWER
Answered 2021-Nov-19 at 01:13I think you may be extrapolating too much that this is an issue with Cloudflare or being blocked. A quick search of your first service results in a notice that they have shut it down (probably due to high usage) -
As of November 10, 2021 we are no longer providing this API due to massive abuse.
https://whatismyipaddress.com/api
Your other services could be experiencing similar issues with reliability. Server security wouldn't really cause DNS lookup to fail. Luckily there are many, many, alternatives you can try. For example -
Or Cloudflare even has an (undocumented) endpoint that could be used -
https://www.cloudflare.com/cdn-cgi/trace
At the end of the day though, if you want something reliable / guaranteed, you'll probably have to pay for it. Otherwise be prepared to shift to a new service every so often. Luckily the data returned should be easy to integrate (an IP address).
QUESTION
It's more of a general question, but What is the recommended way to protect APIs used in SIGN UP processes? Let's say there is these public APIs (No user credential required, only API KEYs);
- find_person(Data about the person trying to sign up), returns if a person already exists or not (no user credentials required AND no sensitive information returned).
- create_person(Data about the person trying to sign up), creates this person into the system (no user credentials required)
Can we have "anonymous" users that have a short-lived JWT token? For example, how can the SPA Web application or Mobile application securely obtain a "per-session" anonymous user? Are Captchas actually helpful in this scenario?
We are already considering:
- API KEY for every application (not per session)
- Rate limiting
- DDoS services to protect the APIs
Any help would be much appreciated.
Thanks
...ANSWER
Answered 2021-Nov-11 at 22:17Can we have "anonymous" users that have a short-lived JWT token?
Yes, you can and its recommend that you even do it for logged users. See the Auth0 blog What Are Refresh Tokens and How to Use Them Securely:
This post will explore the concept of refresh tokens as defined by OAuth 2.0. We will learn how they compare to other token types and how they let us balance security, usability, and privacy.
The problem with using tokens for anonymous users or logged in users is that they only identify who is in the request, not what is doing the request.
The Difference Between WHO and WHAT is Accessing the API ServerI wrote a series of articles around API and Mobile security, and in the article Why Does Your Mobile App Need An Api Key? you can read in detail the difference between who and what is accessing your API server, but I will extract here the main takes from it:
The what is the thing making the request to the API server. Is it really a genuine instance of your mobile app, or is it a bot, an automated script or an attacker manually poking around your API server with a tool like Postman?
The who is the user of the mobile app that we can authenticate, authorize and identify in several ways, like using OpenID Connect or OAUTH2 flows.
So, think about the who as the user (anonymous or logged) your API server will be able to Authenticate and Authorize access to the data, and think about the what as the software making that request in behalf of the user.
Your Possible SolutionsWe are already considering:
- API KEY for every application (not per session)
- Rate limiting
- DDoS services to protect the APIs
This are basic security measures that any API should implement, but they will fall short when it comes to give na high degree of confidence to API server that the request is indeed from what it expects, a genuine and untampered version of your app.
You can read more about in my article The Top 6 Mobile API Protection Techniques - Are They Enough?:
Other Possible solutionsIn this article we will explore the most common techniques used to protect an API, including how important it is to use HTTPS to protect the communication channel between mobile app and API, how API keys are used to identify the mobile app on each API request, how user agents, captchas and IP addresses are used for bot mitigation, and finally how user authentication is important for the mobile security and api security. We will discuss each of these techniques and discuss how they impact the business risk profile, i.e. how easy they are get around.
The reader will come to understand why today’s commonly used mobile API protection techniques are very naive and not fit for purpose to defend digital businesses against API abuse. API abuse is its various forms is much more commonplace that most businesses realize so it is important to employ the right techniques to maintain revenue and brand reputation.
For example, how can the SPA Web application or Mobile application securely obtain a "per-session" anonymous user?
With web apps its very easy to introspect them and see the API requests and their responses by just using the developer tools on the browser.
For mobile apps more work its required but a plethora of open source tools exist to make it easy and in some cases trivial to the point that even non developers can do it, thus making the task of securing an API server very hard, but not impossible.
So, do to the completely different way how the web and mobile devices work the approaches to secure them will differ.
For Web AppsAre Captchas actually helpful in this scenario?
Captcha gives you a score to tell you a likely who is in the request is a real human. At the best score it cannot guarantee with an high degree of confidence that what is doing the request is indeed what your API server expects, a genuine and untampered version of your web or mobile app.
To learn some useful techniques to help your API backend to try to respond only to requests coming from what you expect, your genuine web app, you can read my answer to the question Secure api data from calls out of the app, especially the section dedicated to Defending the API Server.
For Mobile AppsIt's more of a general question, but What is the recommended way to protect APIs used in SIGN UP processes?
Despite not being specifically for the signup process I recommend you to read this answer I gave to the question How to secure an API REST for mobile app?, especially the sections Hardening and Shielding the Mobile App, Securing the API Server and A Possible Better Solution.
From that answer the better approach that can be employed is by using a Mobile App Attestation solution that will enable the API server to know is receiving only requests from what it expects, a genuine and untampered version of your mobile app.
Do You Want To Go The Extra Mile?In any response to a security question I always like to reference the excellent work from the OWASP foundation.
For APISFor Mobile AppsThe OWASP API Security Project seeks to provide value to software developers and security assessors by underscoring the potential risks in insecure APIs, and illustrating how these risks may be mitigated. In order to facilitate this goal, the OWASP API Security Project will create and maintain a Top 10 API Security Risks document, as well as a documentation portal for best practices when creating or assessing APIs.
OWASP Mobile Security Project - Top 10 risks
The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.
OWASP - Mobile Security Testing Guide:
For Web AppsThe Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.
The Web Security Testing Guide:
The OWASP Web Security Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.
QUESTION
I deployed a DDoS honeypot called Amppot in a ubuntu EC2 machine to study characteristics of attacks. This honeypot automatically outputs daily logs and sqlite files describing the requests it got.
I wrote a python script that converts the sqlite file into csv file and does some treatments.
My workflow at the moment is:
- I connect to the instance via ssh
- I copy the sqlite files from the ec2 instace to my machine
- I execute the python script on my machine
- I push the csv files produced by the script to a gitlab repository so that all members have the data.
I would like to automate all of this using a gitlab CI/CD pipeline. All the information I found on google are about tasks going in the opposite direction (from local to ec2 instance).
I managed to add a bash runner to the gitlab project and I know that I have to write the .gitlab-ci.yml file. I also know that I will probably need to setup a service account. However, I have never used gitlab CI/CD or done any DevOps before so I don't know if what I want to do is even possible.
...ANSWER
Answered 2021-Nov-08 at 13:59In my opinion, you are leveraging Gitlab (for storing logs, metrics, app data, etc.) in the wrong way. Source control management (SCM) systems are meant for your source-code, and clearly not for application logs or any data your app is producing.
Instead, for this you would use tools like e.g. CloudWatch logs, S3, any other data source (ElasticSearch, DynamoDB, RDS, etc.). So your application (Amppot) should be instrumented accordingly.
If you pick CloudWatch for logs and metrics collection, you could configure Amazon CloudWatch agent on your EC2 instance and instrument it to push your logs (that your application is producing) to a CloudWatch log group. See documentation here.
Your app would push its stderr
and stdout
streams into local files (e.g. /var/log/amppot.log
), and CloudWatch agent would sync them with AWS CloudWatch service.
If, despite of the above, you still want to push your application files to Gitlab (from your EC2), then simply configure a cron job, that will execute the following bash script on a regular interval:
QUESTION
I am using SignalR
java client in android and .net core3
as my webservice.
I configured a set-cookie header in my responses from webservice to prevent DDOS attacks
, but now I can't connect to my Hub because there is no option in SignalR
java client to Handle set-cookie header .
How can I fix this problem?
ANSWER
Answered 2021-Nov-08 at 09:54Well after alot of search I came to this :
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install DDoS
You can use DDoS like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page