Application vulnerability due to Non Random Hash Functions

Understanding Attack Vector How HashMaps work Say a comment form on a blog accepts the parameters – first_name, last_name, comment – as post parameters. Internally, Tomcat stores these parameters as a HashMap. The logical structure of this HashMap is like this – “first_name” –> “Sripathi” “last_name” –> “Krishnan” “comment” —> “DoS using poor Hashes” But … Read more

How to enable DDoS protection?

DDOS is a family of attacks which overwhelm key systems in the datacenter including: The hosting center’s network connection to the internet The hosting center’s internal network and routers Your firewall and load balancers Your web servers, application servers and database. Before you start on building your DDOS defence, consider what the worst-case value-at-risk is. … Read more