unix and linux operating commands

A Different Kind of DoS Attack


 
Thread Tools Search this Thread
# 1  
Old 09-17-2008
A Different Kind of DoS Attack

I locked my wife out of her webmail account the other day, unintentionally. I won't go into boring the details of why I was trying to get into her email, but as a disclaimer let me say that we both have access to each other's webmail account, out of trust. But in this instance I couldn't get a hold of her and I just needed a snippet of info. It was late, I was tired and impatient, so I just kept on trying password after password. Eventually I just gave up and went to bed.

A few hours later I was awoken by my wife yelling "you locked me out of my email account!" She might have called me something too.

Due to the her webmail provider's security policy, even after she had entered alternative personal information to reset her password, her account was locked for 24 hours. So I had ostensibly executed a Denial of Service (DoS) attack on exactly the wrong person: my wife.

A common organizational security policy is to lock a user's account after three failed login attempts; in order to unlock it, the user must then contact the help desk. This policy therefore constitutes a DoS vulnerability, because anyone can lock a user's account if the victim's login ID is known: just enter anything for the password three times and the user gets locked out (or denied service.) This common policy is drafted assuming failed login attempts are done either by a well-intentioned user who fat-fingered or forgot the password, or by an attacker who is trying to guess the password in order to gain access to the system. But there is this other possibility: an attacker intentionally botching a user's login in order to lock the victim out.

This form of a DoS attack should at least be considered when drafting a login failure policy. Otherwise, workstations and webmail accounts alike will remain vulnerable to this unusual form of a DoS attack.


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. Linux

Kind of reverse engineering

Hi everyone, I'm a linux novice , in a training purpose i have to reconstruct under windows an application running under fedora 14, the application communicates with an STB device through RS232 in a first time and then through ethernet for firmware loading purpose. All what i know is how to run... (2 Replies)
Discussion started by: nidal
2 Replies

2. Cybersecurity

What kind of hacking is going on here??

Connecting to the Internet with OpenVPN, the connection fails. Rerunning openvpn works second time round but the install is hacked at that point (e.g., a rogue 'java-security' update tries to install itself on 'yum update', yum however spots this and rejects the download, other basic things start... (3 Replies)
Discussion started by: GSO
3 Replies

3. Cybersecurity

What I think is a DoS attack

About 3 days ago our Apache logs started filling with the following errors: mod_ssl: SSL handshake failed (server <weberver>:443, client 41.235.234.172) (OpenSSL library error follows) OpenSSL: error:1408A0B7:SSL routines:SSL3_GET_CLIENT_HELLO:no ciphers specified These initially were... (1 Reply)
Discussion started by: ccj4467
1 Replies

4. Linux

dos-path / un-dos-path compatibility with cygwin

Hello ; I have a problem running some script on dos . when i run : C: ls /temp ls: cannot access /temp: No such file or directory but when i run C: ls \temp windriver backup remotebackup also when i run C: ls temp windriver backup remotebackup The... (4 Replies)
Discussion started by: mulder20
4 Replies

5. Shell Programming and Scripting

Kind of knapsack problem

I need to run as many (thousands) very small cron jobs within a duration of 5 minutes and repeatedly through out the day. This kind of requirement would be up against system resources and limitations such as nproc, maxuprc, numbers of cron jobs allowed in crontab, RSS, SWAP, CPU and others that I... (3 Replies)
Discussion started by: ngungo
3 Replies

6. UNIX for Dummies Questions & Answers

Kind of weird question

I recently purchased a book titled Hacking: The Art of Exploitation. When I got it home I read the preface and found out that i shouldnt have bought it. It says the code examples in this book were done on an x86 based computer (I have a mac). Is there anything I can do to make my mac run similar to... (2 Replies)
Discussion started by: Cyberaxe
2 Replies

7. UNIX for Dummies Questions & Answers

what kind of UNIX

ok, so i want to figure out what type of UNIX i have and in this book im reading about it, it says that i can figure out what type i have by typing the command uname in the prompt. So i did this and it came up saying Darwin?? is that part of System V UNIX or BSD or do i have LINUX? if anyone can... (2 Replies)
Discussion started by: hiei
2 Replies
Login or Register to Ask a Question