Objective: Disrupt Availability or Integrity of Target Application via Vegeta
Goal: Disrupt Availability or Integrity of Target Application via Vegeta
├── 1. Denial of Service (DoS) via Resource Exhaustion !!!
│ ├── 1.1. Overwhelming Target with Excessive Requests ***
│ │ ├── 1.1.1. High Request Rate (-rate
) ***
│ │ │ ├── 1.1.1.1. !!!Exploit lack of rate limiting on target.!!!
│ │ │ └── 1.1.1.2. Bypass any existing rate limiting (e.g., IP rotation, distributed attack).
│ │ ├── 1.1.2. Long Duration (-duration
) ***
│ │ │ ├── 1.1.2.1. Sustain high request rate for extended period.
│ │ │ └── 1.1.2.2. Combine with high -rate
for amplified effect.
│ │ ├── 1.1.3. Large Number of Connections (-connections
)
│ │ │ ├── 1.1.3.1. Exhaust target's connection pool.
│ │ │ └── 1.1.3.2. Cause connection timeouts and errors.
│ │ ├── 1.1.4. Large Payloads (via -body
or custom targets)
│ │ │ ├── 1.1.4.1. Send excessively large request bodies.
│ │ │ ├── 1.1.4.2. Target endpoints known to be vulnerable to large payloads.
│ │ │ └── 1.1.4.3. Craft payloads to trigger resource-intensive processing on the target.
│ │ └── 1.1.5. HTTP/2 Multiplexing Abuse (if target supports HTTP/2)
│ │ ├── 1.1.5.1. Exhaust stream limits.
│ │ └── 1.1.5.2. Cause connection resets.
│ └── 1.2. Exploiting Target-Specific Weaknesses Revealed by Vegeta
│ ├── 1.2.1. Identify Slow Endpoints (using Vegeta's reports)
│ │ ├── 1.2.1.1. Focus attacks on identified slow endpoints.
│ │ └── 1.2.1.2. Use slow endpoints to amplify resource exhaustion.
│ ├── 1.2.2. Identify Error-Prone Endpoints (using Vegeta's reports)
│ │ ├── 1.2.2.1. Trigger specific error conditions repeatedly.
│ │ └── 1.2.2.2. Cause cascading failures due to error handling issues.
│ └── 1.2.3. Identify Resource-Intensive Operations
│ ├── 1.2.3.1. Trigger operations that consume significant CPU, memory, or database resources.
│ └── 1.2.3.2. Combine with high request rates for maximum impact.
│
├── 2. Information Disclosure via Vegeta Misconfiguration or Exploits
│ ├── 2.1. Leaking Sensitive Data in Reports
│ │ ├── 2.1.1. Unintentional Exposure of API Keys/Tokens in -header
│ │ │ ├── !!!2.1.1.1. Reports stored insecurely (e.g., public S3 bucket).!!!
│ │ │ └── 2.1.1.2. Reports accessed by unauthorized users.
Attack Tree Path: Denial of Service (DoS) via Resource Exhaustion
- Description: This is the overarching category for attacks that aim to make the target application unavailable by overwhelming its resources. It's a critical node because DoS is a common and impactful attack vector.
- Likelihood: High
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: Overwhelming Target with Excessive Requests
- Description: This path focuses on sending a flood of requests to the target, exceeding its capacity to handle them.
- Likelihood: High
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: High Request Rate (-rate
)
- Description: Using Vegeta's
-rate
option to send a large number of requests per second. - Likelihood: High
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: Exploit lack of rate limiting on target
- Description: The target application does not have any mechanisms to limit the number of requests from a single source, making it highly vulnerable to DoS. This is a critical vulnerability.
- Likelihood: Medium (depends on the target's configuration)
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: Bypass any existing rate limiting
- Description: Circumventing rate limits, for example by rotating IP addresses.
- Likelihood: Low
- Impact: High
- Effort: Medium
- Skill Level: Medium
- Detection Difficulty: Low
Attack Tree Path: Long Duration (-duration
)
- Description: Using Vegeta's
-duration
option to sustain the attack for an extended period. - Likelihood: High
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: Sustain high request rate for extended period
- Description: Keeping up a high request rate for a long time.
- Likelihood: High
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: Combine with high -rate
for amplified effect
- Description: Using both high request rate and long duration.
- Likelihood: High
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: Medium
Attack Tree Path: Information Disclosure via Vegeta Misconfiguration or Exploits
Attack Tree Path: Leaking Sensitive Data in Reports
Attack Tree Path: Unintentional Exposure of API Keys/Tokens in -header
Attack Tree Path: Reports stored insecurely (e.g., public S3 bucket).
- Description: Vegeta reports, which might contain sensitive information (API keys, internal URLs, etc.), are stored in a location that is publicly accessible or has insufficient access controls. This is a critical configuration error.
- Likelihood: Low (requires negligence)
- Impact: High
- Effort: Low
- Skill Level: Low
- Detection Difficulty: High (attacker would need to find the insecure location)