Network Time Protocol (NTP): 123

Security Weaknesses

  • Vulnerable to amplification attacks in DDoS scenarios.

  • Time spoofing can disrupt systems relying on accurate timestamps.

  • Lack of authentication in basic NTP configurations.

Security Defense and Mitigation Measures

  • Use NTP over authenticated methods like NTS (Network Time Security).

  • Restrict NTP traffic to known servers.

  • Monitor for unusually large NTP responses.

Indicators of Compromise or Attack

  • Unusual time synchronization errors.

  • High volumes of NTP traffic from unexpected sources.

  • Discrepancies in logs due to incorrect timestamps.

Last updated