Jump to content
Nytro

Owasp Http Post Dos Apache Webserver Attack

Recommended Posts

Posted

Owasp Http Post Dos Apache Webserver Attack

Description: This Tutorials shows, how you can easily take out an Apache Webserver with one HTTP POST Tool using a std. slow DSL Connection.

This is NO Slowloris Attack!

Limitations of HTTP GET DDOS attack:

- Does not work on IIS web servers or web

servers with timeout limits for HTTP headers.

- Easily defensible using popular load balancers,

such as F5 and Cisco, reverse proxies and

certain Apache modules, such as mod_antiloris.

- Anti-DDOS systems may use "delayed

binding"/"TCP Splicing" to defend against HTTP

GET attacks.

Why HTTP POST DDOS attack works

- This attack can evade Layer 4 detection

techniques as there is no malformed TCP, just

like Slowloris.

- Unlike Slowloris, there is no delay in sending

HTTP Header, hence nullifying IIS built-in

defense, making IIS vulnerable too.

- Size, character sets and time intervals can be

randomised to foil any recognition of Layer 7

traffic patterns by DDOS protection systems.

- Difficult to differentiate from legit connections

which are slow

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Sursa: Owasp Http Post Dos Apache Webserver Attack

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...