Posts

Showing posts from May, 2016

Protect your apache server from WordPress Pingback DDoS attacks

Image
A security researcher at SANS Technology Institute put out an  advisory  around 8 months ago when he discovered that WordPress’s “pingback” functionality contains an exploit allowing it to request a result from any server that an attacker wishes. This vulnerability means that there are thousands of WordPress installations that can be effectively weaponized to conduct floods against any target site of someone’s desire. This particular attack is dangerous because many servers can be overwhelmed with only 200 blogs “pingbacking” their site, clogging up their limited connections and/or resources. To confirm if you are under wordpress pingback ddos attack, check your access logs. $ sudo tail -f /var/log/apache2/access.log Logs will look like this: 74.86.132.186 - - [09/Mar/2014:11:05:27 -0400] "GET /?4137049=6431829 HTTP/1.0" 403 0 "-" " WordPress /3.8; http://www.mtbgearreview.com" 143.95.250.71 - - [09/Mar/2014:11:05:27 -0400] "GET /?4758117=50739