DDoS-Stresstest

by zeroBS.

Highest level of expertise in DDoS testing and consulting.
IT-Security made in Germany (since 2015)

Partner DDoS Resiliency Score (DRS)

zeroBS GmbH - DDoS-Stresstest anhand des DRS

Introduction

zeroBS is a pioneer in the field of IT security and offers a dedicated, cloud-based platform that has been specially developed for carrying out DDoS stress tests. Further core competences are in the simulation of network attacks and the testing of protection mechanisms for your infrastructure.
Our customisable platform enables targeted testing in the form of Layer 7 attacks and IPv6 protocols. We evaluate the resilience of your systems from various entry points such as existing anti-DDoS appliances, firewalls, load balancers, application servers - including BGP-side entry points.
The importance of DDoS stress tests goes beyond the purely technical aspects. They also serve as an effective method for training your team while simultaneously determining the performance limits of your infrastructure. By carrying out comprehensive analyses in advance and integrated monitoring of attacked targets, we can gain meaningful insights into the performance of your systems.
In an increasingly connected world, protecting your infrastructure from network attacks is critical. Our DDoS stress tests offer you the opportunity to test the effectiveness of your defence mechanisms not only in conventional scenarios, but also in advanced Layer 7 attacks and using IPv6 protocols in real time - take your IT security to a new level.

Features

View screenshots of our platform here

References of our work

We have already successfully tested these manufacturers, technologies and providers, among others.

AttackModes

Carpet bombing attacks are a new variant of the more common reflection or flooding attacks, where instead of focusing the attack on a single destination, the attacker attacks every destination within a specific subnet or CIDR block (for example, a /20). This will both make it more difficult to detect the attack and also to mitigate it, potentially resulting in outages due to the flood of attack traffic across network devices and internal links.

In addition, these attacks are often fragmented, resulting in a flood of non-initial IP fragments, which can be tricky to mitigate. The attacker will often shift their attacks from one subnet (or CIDR block) to another, complicating the detection and mitigation even further.

Very similar to Carpetbombing in terms of target selection, the Chewie attack brings more randomness to the game by choosing target, strength, vector and protocol completely at random.

This ensures that pure statistics-based detection methods are completely confused, as the packet stream from an attack IP never lasts longer than 30 seconds, and then stops for at least 120 seconds, only to start again with a new target and pattern.

Although only 25% of the bots in a botnet are active at any one time, the attack is much more difficult to defend against

DDoS RedTeaming

We are able to both recreate and carry out sophisticated attacks. Target analysis and selection are carried out using the "Recon" and "OSINT" methods in order to subsequently identify the neuralgic points of interest.

We have seen in several DFIR analyses that this attacker behaviour is not uncommon.
The links on the right take you to the detailed reports.

Scope

Attack modules

Target groups

*New load generators are used for all attacks to prevent "learning" of signatures.

Reasons for a stress test

The following targets can be tested:

Attack vectors

en_GBEnglish

Your request

Contact us

I have read the information on data protection and the use of personal data and agree to it