Get your servers tested and protected against Denial of Service attacks.

Denial of Service - Testing and Protecting

This service consists of a series of tests with the objective of verifying that the servers aren't susceptible to a denial of service attack. A window of time is defined during which, under complete supervision of the processes and resources, a wide range of different DoS attacks are performed.

The tests consist of the following:

1. Saturate the servers by sending a vast amount of requests to the web application.
2. Testing for DoS through the use of commercial tools.
3. Testing for DoS through the use of several public and private tools.
4. Testing for DoS based on the software and services running on the server.

Some of our tests include the same attacks and tools used by hacktivist group Anonymous. By using clients with connections to the Internet backbone, our Distributed Denial of Service (DDoS) tests can be performed with up to 50,000 virtual users (200,000 virtual browsers), in which we show a visual geographic distribution of each unique connection made by the virtual users.

We additionally use other tools (both public and private), which in many cases can be more effective than the tools used by Anonymous.

Furthermore, we analyze the version of the software installed on the server to verify that there aren't any known vulnerabilities or faulty configurations that could result in a denial of service. In the event that a vulnerability of this kind was found on the server, it would be tested using the available proof of concept.

Latest Blog Entries

Three Non Web-based XSS Injections
In this post guest blogger Alejandro Hernandez (nitr0us) writes about some interesting and fun XSS vectors which are not commonly seen.

Belkin Wemo Switch NMap Scripts
Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published

Downloading an Application's Entire Source Code Through an Exposed GIT Directory
Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.

Latest News

Blackhat EU 2015
Websec participated with two tools at the Blackhat, EU Arsenal held in Amsterdam, NL from the 10-13 of November, 2015. During this event, we introduced our brand new tool "credmap: The Credential Mapper" and also presented an amped-up version of Panoptic.

BSides Vancouver 2015
Websec is proud to announce that we will be attending the 3rd annual edition of BSides Vancouver, a local non-profit information security conference held in the heart of Vancouver, BC on March 16 and 17.