Edit
Delete
Problem Name:
Slow HTTP denial of Service Attack
Problem URL
http://10.238.*. *:58* * *
Risk Level:
High
Problem Type:
Server Configuration Classes
Vulnerability Description:
When using HTTP post:post, specify a very largeContent-length, and then a
1.1.1 Summary
Recently, network security has become a focus. In addition to domestic plaintext password security events, there is also a major impact-Hash Collision DoS (Denial-of-service attacks through Hash collisions ), some malicious people will use this security vulnerability to make your server extremely slow. What measures do they use to make the server extremely slow? How can we prevent DoS attacks
Corrective Suggestions1. Interrupts use the URL does not support the HTTP method access to the session2. Limit the HTTP header and packet length to a reasonable value3. Set an absolute session time-out4. If the server supports the backlog, you need to set a reasonable size5. Set a minimum inbound data transfer ratePenetration Status:Security Scan + Manual test.Vulnerability principle:Scan Discovery WebThe server or application server exists slow HTTP denial
There's a magical tool called "Slowhttptest" under Kali Linux.
Command: slowhttptest-c 1000-h-g-o slowhttp-i 10-r 200-t get-u http://10.210.6.69:8081/nmc-x 24-p
Opening the appropriate paging server during a slow Dos attack can respond slowly or directly to the unresponsive: Fix the scenario:
1, limit the number of single-machine IP connections.
2. Limit the timeout period for HTTP request Header/body
Slow HTTP
will have a large number of TCP connections waiting for time_wait until all server resources are used up, therefore, resources cannot be allocated to receive requests from other clients.
In this way, when a normal user sends a request to the server, the request cannot be successful because there is no resource. Therefore, DOS denial-of-service attacks are generated.Summary
The main reason for DOS DoS attac
level verbose 0-4 log-w byte Range The window size of the ad will be selected from-x- byte maximum length of trace data End-y- byte Range The window size of the ad is selected from-z byte reads bytes from the receive buffer with a single read () operationthird, the solutionmethod One: limit the maximum license time of the HTTP header transmission for the Web server , modified to a maximum license time oftake Tomcat for example and open server.xml to find connectiontimeout= "20000" Redirect
This is a complete solution, but it is a bit exaggerated, but it can indeed alleviate the vulnerability of TCP servers when they suffer a "Denial of Service attack.When the server provides services in TCP mode, the client connects to the server over TCP. At this time, maliciousProgramYou can also use TCP to connect to our server. If malicious programs establish thousands of connections to our server cyclica
The previous two articles introduced (through the construction of a hash conflict to implement a variety of language denial of service attacks, PHP array hash Conflict example), the attack method is very high, the cost of attack is very small. A desktop can easily take down dozens of units, hundreds of servers.
And Pi
Problem Name:
Slow HTTP denial of Service Attack
problem URL
http://10.238.*.*:58***
Risk Level:
High
Problem Type:
Server Configuration Classes
Vulnerability Description:
When using HTTP post:post, specify a very largeContent-length, and then at a very low speed, such as 10-100s send a byte, hol
Distributed denial of attack (DDOS) software tfn2k attack and defense
First of all, the purpose of my writing this article is not what I want to be hacker and so on, and I do not encourage anyone to use it to do something detrimental to others, I just want one more
Some people pay attention to network security, together research and defense of DOS. Because I wa
one! The accumulated waiting time becomes the cause of the impact on normal data transmission. Because the attacker keeps sending Syn packets, the server waits infinitely, and other data packets cannot enter the server, everything is done. This is the most common and abusive denial-of-service mode, and there are also a lot of ready-made attack tools, such as pop
"Yellow Emperor's Internal Classic": "The reason why people are born, the reason why people are ill, the reason why people are cured, and the reason why they are ill", the author is "Life and death, hundreds of diseases, adjust the actual situation, ", Cheng is the most important part of the human body. Once the meridians are disconnected, various diseases will be lost. From the perspective of its impact, Denial-of-
DDOS (Distributed denial of service) conceptsDDoS is called distributed denial of service, and DDoS is the use of reasonable requests to forge resources overload, resulting in service unavailability. For example, a parking lot has 100 parking spaces, and when 100 parking spa
The emergence of distributed Denial-of-service Attack (DDoS) is a disaster for online enterprises, especially the network of telecom operators, and its effective protection is always a difficult problem in network application.
DDoS has always been a very headache, it is a difficult to use traditional methods to protect the at
The emergence of distributed Denial-of-service Attack (DDoS) is a disaster for online enterprises, especially the network of telecom operators, and its effective protection is always a difficult problem in network application.
DDoS has always been a very headache, it is a difficult to use traditional methods to protect the a
DOS: is the abbreviation for the denial of service, the denial of service, not the DOS operating system, which causes Dos attacks to be called Dos attacks, and is designed to make the computer or network unable to provide normal services. The most common Dos attacks are computer network bandwidth attacks and connectivi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.