4.9 • 696 Ratings
🗓️ 31 July 2017
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 31st, 2017 edition of the Sandcent Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and the day I'm recording from Jacksonville, Florida. |
0:12.9 | This weekend at Defcon in Las Vegas to researchers release details about a flaw in windows that can be used to shut down a window |
0:23.4 | system by flooding it with SMB requests. The attack works somewhat similar to an older attack |
0:31.0 | that attacked web servers. The web server attack was dubbed the Slow Loris. So in order to show that similarity, this new attack has been named SMB Loris. |
0:43.3 | However, the details how the attack works is a little bit different in Slow Loris. |
0:49.3 | All you did is you chewed up all the connections that a server could handle. |
0:54.6 | So essentially, you would connect to the web server and send a couple of headers and then just |
0:58.7 | stop sending any additional data before the complete set of headers was sent. |
1:04.3 | The end effect was that the system ran out of connections, but the system itself was still |
1:10.3 | responsive. It could still be, for example, |
1:13.3 | rebooted remotely via another service like SSH. SMB Loris is a little bit more dangerous in that sense. |
1:23.2 | The SMB Loris attack opens an SMB connection and requests a buffer. |
1:28.7 | The maximum buffer size possible for this request is 128 kilobyte, which isn't really a lot, |
1:35.9 | but still enough once you realize that for each source IP address, you can open 65,535 connections one for each source port which will reserve about |
1:49.0 | 8 gigabyte now this memory is allocated without allowing it to be pageed to swap so this has to be |
1:58.4 | located in physical RAM and 8 gigabyte is quite a bit of course with a |
2:04.5 | multiple source IPs you would be able to get multiples of 8 gigabyte reserved. |
2:11.9 | After 30 seconds the memory is freed so you would have to flood the system with the necessary number of connections |
2:18.8 | within 30 seconds. |
2:21.5 | Now unlike in the HDP SlowLoris case, the system however becomes completely unresponsive. |
2:29.7 | What happens is that as the system tries to find more memory, the CPU is scanning the memory for any free memory |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.