application attack called slow attack (slow HTTP DDOS), on the contrary, is slow connection, consumes all your resources, more famous such as Slowloris. For the first, the rationale is to detect traffic and access frequency, and to block IPFor the second type, use Netstat t
Attack, the first response is a huge amount of traffic, a huge amount of messages. But there is a kind of attack but the opposite, is known as slow, so that some attack targets were killed did not know how to die, this is a slow connection
Rectification Suggestions
1. Interrupts using URLs that do not support HTTP method access
2. Limit HTTP headers and packet length to a reasonable value
3. Set an absolute session timeout time
4. The server supports the backlog case, needs to set a reasonable size
5. Set a minimum inbound data rate
Penetration Status:
Security Scan + Manual test.
The principle of vulnerability:
Scan Discovery Web
The server or application server has a slow HTTP denial
I. Description of the vulnerabilityUse HTTP POST request, Specify a very large content-length, and then send the packet at a very low speed, such as 10-100s A byte and keep the connection constantly open. When the number of client connections reaches a certain level, it consumes all available connections from the server, resulting in DOS. Ii. exploitation of exploitspenetration tool:slowhttptest:https://github.com/shekyan/slowhttptest.gitInstallation Process:Switch to slowhttptest extract direct
off.
September 19
The script is very effective, except that the load is slightly higher, access is normal.
September 20
When the attacker discovers that SYN is invalid, it uses a join attack with the wait state instead. This is relatively good to do, as long as the above code in the SYN to change to "syn\\| Wait "can be. Such as:
Netstat-atn | Grep-c "syn\\| Wait "
September 22
As the attack intensified, i
There's a magical tool called "Slowhttptest" under Kali Linux.
Command: slowhttptest-c 1000-h-g-o slowhttp-i 10-r 200-t get-u http://10.210.6.69:8081/nmc-x 24-p
Opening the appropriate paging server during a slow Dos attack can respond slowly or directly to the unresponsive: Fix the scenario:
1, limit the number of single-machine IP connections.
2. Limit the timeout period for HTTP reque
Tomcat slow HTTP denial of service attack security solutionProblem Description: The design of the HTTP protocol requires the server to fully receive the request before processing. If the HTTP request is not completed, or the transfer rate is very low, the server keeps its resource consumption waiting for the remaining data. If the server consumes too many resources, it can cause a denial of service.Workarou
Slow HTTP Denial of Service Attack Vulnerability solution, denialattack
Question Name:
Slow HTTP Denial of Service Attack
Problematic URL
Http: // 10. 238. *. *: 58 ***
Risk Level:
High
Problem type:
Server Configuration
Vulnerability description:
When using h
Problem Name:
Slow HTTP denial of Service Attack
Problem URL
http://10.238.*. *: 58***
Risk Level:
High
Problem Type:
Server Configuration Classes
Vulnerability Description:
When using HTTP post:post, specify a very largeContent-length, and then at a very low speed, such as 10-100s send a byte, hold this connection continuously
Edit
Delete
Problem Name:
Slow HTTP denial of Service Attack
Problem URL
http://10.238.*. *:58* * *
Risk Level:
High
Problem Type:
Server Configuration Classes
Vulnerability Description:
When using HTTP post:post, specify a very largeContent-length, and then at a very low speed, such as 10-100s send a by
Corrective Suggestions1. Interrupts use the URL does not support the HTTP method access to the session2. Limit the HTTP header and packet length to a reasonable value3. Set an absolute session time-out4. If the server supports the backlog, you need to set a reasonable size5. Set a minimum inbound data transfer ratePenetration Status:Security Scan + Manual test.Vulnerability principle:Scan Discovery WebThe server or application server exists slow HTTP
Problem Name:
Slow HTTP denial of Service Attack
problem URL
http://10.238.*.*:58***
Risk Level:
High
Problem Type:
Server Configuration Classes
Vulnerability Description:
When using HTTP post:post, specify a very largeContent-length, and then at a very low speed, such as 10-100s send a byte, hold this connection continuously open. When the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.