Skip to content
SENKI
Surfing Internet Security & Resiliency as we thrive, heal, and grow in this life ….
  • Practical Security Guides, Projects, & Workbooks
    • DDoS Resiliency & Attack Preparation Workbook
      • DDoS Resiliency Workshop – 2022
      • DDoS Extortionist’s Behaviors
      • Operator’s Security & Resiliency Toolkit
      • Expected DoS Attacks – 10 Steps to Prepare for the Pain
      • 7 Habits of Highly Effective Cyber-Criminals
      • BGP Route Hijack – What can be done Today?
      • Preparing for DOS Attacks – the Essentials
        • Remote Triggered Black Hole (RTBH) Filtering
        • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
        • Study Materials for Operational Security and DOS Defense
          • US’s National Strategy to Secure Cyberspace (2003)
        • SLA as a Security Tool
        • Remediating Violated Customers
        • Open Source Threat Intelligence Feeds
      • The History of DDoS and DoS
    • Network Operations & Scaling
      • Operator’s Security Toolkit – Main Page
        • The Service Provider Security “Bootcamp”
          • June 2014 Workshop Slides
          • Indonesia SP Workshops
          • CommunicAsia 2015
          • APRICOT 2012 Network Security Workshop
          • June 2014 Workshop Slides
          • Telecoms Security Workshop 2012
          • MAAWG 2012 Security Workshop
      • ISP Workshop Program
        • ITU Africa Telecom 98 IXP Demonstration
        • Singapore Internet Backbone (SIB)
      • Public Cloud DNS Resolvers (which offer services)
      • DNS Latency and Performance Test Tools
      • Network Operations Groups (NOGs)
    • Vendor Security
      • Meaningful Security Conversations with your Vendors
      • IoT Security Standards & Frameworks
    • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
  • Empowerment
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Principles to invest in Linkedin for an Effective Impact
    • Social Media PODs for Security
    • Programs that Empower Women Engineers
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
  • About Senki
    • Conference Talks, Workshops, and Webinars
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
      • What Drives Barry?
      • Influential Reading List
    • I’ve got an exciting opportunity for you ….

Tag: STUN DDoS reflector

Don't let your Firewalls be STUN DDoS Reflector

Don’t let your Firewalls be STUN DDoS Reflector

Posted on August 13, 2022August 13, 2022

Your firewalls can be used as a STUN DDoS reflector to attack others on the Internet. Open UDP firewall ports for STUN (Session Traversal Utilities for NAT) are being exploited for DDoS reflection. Your network is most likely one of those networks. Shadowserver now detects 101k IPv4 and 2.9K IPv6 accessible UDP STUN services. These Read More

Categories

  • Conferences, Webinars, & Workshops
  • Cyberwar
  • DoD, DDoS, and Denial of Service
  • Empowering Humanity
  • Internet
  • Operator's Security Toolkit
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy
Theme by Out the Box