Nytro Posted January 6, 2013 Report Posted January 6, 2013 Owasp Http Post Dos Apache Webserver Attack Description: This Tutorials shows, how you can easily take out an Apache Webserver with one HTTP POST Tool using a std. slow DSL Connection.This is NO Slowloris Attack!Limitations of HTTP GET DDOS attack:- Does not work on IIS web servers or webservers with timeout limits for HTTP headers.- Easily defensible using popular load balancers,such as F5 and Cisco, reverse proxies andcertain Apache modules, such as mod_antiloris.- Anti-DDOS systems may use "delayedbinding"/"TCP Splicing" to defend against HTTPGET attacks.Why HTTP POST DDOS attack works- This attack can evade Layer 4 detectiontechniques as there is no malformed TCP, justlike Slowloris.- Unlike Slowloris, there is no delay in sendingHTTP Header, hence nullifying IIS built-indefense, making IIS vulnerable too.- Size, character sets and time intervals can berandomised to foil any recognition of Layer 7traffic patterns by DDOS protection systems.- Difficult to differentiate from legit connectionswhich are slow Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Owasp Http Post Dos Apache Webserver Attack Quote