I Came to Drop Bombs: Auditing The Compression Algorithm Weapon Cache

by Cara Marie Sept. 15, 2017 via www.blackhat.com submitted by belen_caty

A decompression bomb attack is relatively simple to perform --- but can be completely devastating to developers who have not taken the time to properly guard their applications against this type of denial of service. The decompression bomb is not a new attack - it's been around since at least 1996 - but unfortunately they are still horrifyingly common. The stereotypical bomb is the zip bomb, but in reality nearly any compression algorithm can provide fruit for this attack (images, HTTP streams, etc.). What algorithms have the highest compression ratio, the sloppiest parsers, and make for the best bomb candidates? This talk is about an ongoing project to answer that question. In addition to the compression algorithm audit, this research is generating a vast library of tools ("bombs") that can be used by security researchers and developers to test for this vulnerability in a wide variety of applications/protocols. These bombs are being released under an open-source license.

https://www.blackhat.com/us-16/briefings.html#i-came-to-drop-bombs-auditing-the-compression-algor...

Avatar
Steven Ulm 3 weeks, 6 days ago

More and more ways of attacks are showing up... God bless cyber security!

Reply