DDoS Attacks
Analytical Approaches and Justification
Overview
- Task: Use Shodan to detect at risk devices that are connected to the Internet
- Value: Great source for detecting devices that connect to the internet with vulnerable systems
- Typically, the vulnerable devices are targets for DDoS
-
Scanning of these vulnerable devices, organizations can gain an understanding of which devices need to be more secured
- Typical vulnerabilities include: not password or firewall protected, not connected to a private network, or their port is open
Key Insights and Intelligence
Results
- Effects of Attack:
- Unsatisfied customers
- Revenue decrease
- Negative connotation of brand
-
DDoS Primary Targets:
- Devices with open ports
- Not protected by a firewall
- No or weak password protection