1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-20 13:19:01 +00:00

Copyedit http-slowloris docs.

This commit is contained in:
david
2012-07-17 17:19:43 +00:00
parent a111b5bcdc
commit 0288accd74

View File

@@ -3,28 +3,29 @@ local stdnse = require "stdnse"
local http = require "http"
description = [[
Tests a webserver against the Slowloris DoS attack, as it was described at
Defcon 17 by RSnake
(see http://ha.ckers.org/slowloris/)
Tests a web server for vulnerability to the Slowloris DoS attack.
This script opens and maintains numerous 'half-http' connections until the
webserver runs out of ressources, leading to a denial of service.
When the DoS condition is met the script then stops the attack and returns
the payload datas as they could be usefull to tweak further filtering rules:
- Time taken until DoS
- Number of sockets used
- Number of queries sent
Slowloris was described at Defcon 17 by RSnake
(see http://ha.ckers.org/slowloris/).
This script opens and maintains numerous 'half-HTTP' connections until
the server runs out of ressources, leading to a denial of service. When
a successful DoS is detected, the script stops the attack and returns
these pieces of information (which may be useful to tweak further
filtering rules):
* Time taken until DoS
* Number of sockets used
* Number of queries sent
By default the script runs for 30 minutes if DoS is not achieved.
Please note that the number of concurrent connexions must be defined with the
<code>--max-parallelism</code> option (default is 20, suggested is 400 or more)
Also, be advised that in some cases this attack can bring the whole webserver
definitively down, and not just while the attack holds the ressources
(ie: stopping the attack will not bring the server up again).
Also, due to Windows limitations, the attack is unlikely to work
when ran from a Windows machine.
Please note that the number of concurrent connexions must be defined
with the <code>--max-parallelism</code> option (default is 20, suggested
is 400 or more) Also, be advised that in some cases this attack can
bring the web server down for good, not only while the attack is
running.
Also, due to OS limitations, the script is unlikely to work
when run from Windows.
]]
---