A screen shot of a city Description automatically generated

Understanding the Killnet’s DDoS HTTP Flood Attack

DDoS attacks are a powerful tool in cybersecurity, capable of overwhelming online services and infrastructure by flooding with too much traffic, making them unavailable to users. Among the variety of DDoS attack methods, one significant threat that stands out in the cyber landscape is the DDoS Killnet HTTP flood attack.

Decoding Killnet: The Anatomy of an HTTP Layer DDoS Attack

KillNet is a hacktivist group known for employing DDoS attacks and spreading false information. The Killnet HTTP Flood attack targets web servers and apps by bombarding them with excessive HTTP requests. It utilizes the CC-attack script, which automates the process of using open proxy servers to relay attacks. The cc.py script utilizes SOCKS proxies, alongside other types, sourced from various sources, to distribute the attack's source and conceal the attacker's identity. Additionally, the script employs randomization to evade signature-based mitigation, making it difficult to counter.

Types of Killnet HTTP Floods Attacks

Three Types of DDoS Attacks Generated by the attack script used by KillNet are:

HTTP GET Flood Attack:

For this type of attack, HTTP GET requests sent by the attacker appear as follows:

Figure 1: Killnet HTTP GET Flood Packets

HTTP HEAD Flood Attack:

For this type of attack, HTTP HEAD requests sent by the attacker appear as follows:

Figure 2: Killnet HTTP HEAD Floods Packets

HTTP POST Flood Attack:

For this type of attack, HTTP POST requests sent by the attacker appear as follows:

Figure 3: Killnet HTTP POST Floods Packets

DDoS Killnet HTTP Floods Attacks in Keysight ATI

At Keysight Technologies, our Application and Threat Intelligence (ATI) team, researchers have examined the traffic pattern of various Killnet HTTP Floods Attacks and they have published the network traffic pattern of 3 popular attacks traffic of such attack as part of BreakingPoint System’s DDoS Lab in ATI-2024-10 Strike Pack released on May 23, 2024.

Figure 4: Killnet HTTP Floods DDoS Attack coverage in BreakingPoint

Leverage Subscription Service to Stay Ahead of Attacks

Keysight's Application and Threat Intelligence subscription provides daily malware and bi-weekly updates of the latest application protocols and vulnerabilities for use with Keysight test platforms. The ATI Research Centre continuously monitors threats as they appear in the wild. Customers of BreakingPoint now have access to attack campaigns for different advanced persistent threats, allowing BreakingPoint Customers to test their currently deployed security control's ability to detect or block such attacks.

limit
3