Slowloris attack stopped sending sockets after a few minutes. Why?? And why is the socket count 0 when I send to a router IP? (With the owners permission)
πŸ‘︎ 122
πŸ’¬︎
πŸ‘€︎ u/ThicccWalsh
πŸ“…︎ Jan 31 2020
🚨︎ report
SlowLoris DoS and SQL injection in the script - does that script look real?
πŸ‘︎ 37
πŸ’¬︎
πŸ‘€︎ u/Tnynfox
πŸ“…︎ Jul 05 2019
🚨︎ report
slowloris DDoS mitigation on windows 10

hello, is there any possible ways to defend Apache servers from slowloris DDoS attack on Windows 10? I know it's mostly done with Linux but my instructor wants us to use Windows and we don't have any idea on that? thanks in advance.

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/wanluqman13
πŸ“…︎ Aug 03 2020
🚨︎ report
Could you use a slowloris-type attack to bypass rate limiting?

Say you "queue" up a million login requests, basically you start the connection, then "slowloris" until all of your connections are queued, then send all the requests at once.

Additionally, what would happen if you queued millions of requests to a performance-heavy endpoint, then sent all the requests at once?

πŸ‘︎ 7
πŸ’¬︎
πŸ‘€︎ u/rotcel2
πŸ“…︎ Jul 08 2019
🚨︎ report
Snort Rule for Detecting Slowloris DOS Attack

Hi All,

Looking for a bit of help here...

As part of my uni course I need to select an attack then develop a Snort rule to detect it and show it in action. I found a Python implementation of the Slowloris attack, which I ran and analyzed. I found a common theme of the attack is the partial GET headers always contained the text 'X-a:' followed by four random digits. I wrote the following rule utilizing regular expressions (I believed this would cut down on false positives):

alert tcp any any -> any 80 (msg:"Possible Slowloris Attack Detected";
flow:to_server,established; pcre:"/X-a|3a| \d{4}../"; sid:10000005;)

which detects the attack successfully with minimal false positives.

My question is how I could improve upon the rule, or even if there is a better rule altogether. I understand it's not the best method of detecting the attack, as the 'X-a' in the Python script could easily be changed to something altogether (I think).

Thanks in advance for any advice.

πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/dinosaurdave88
πŸ“…︎ Apr 08 2018
🚨︎ report
Welcome to Slowloris - the low bandwidth, yet greedy and poisonous HTTP client! ha.ckers.org/slowloris/
πŸ‘︎ 10
πŸ’¬︎
πŸ“…︎ Jul 23 2014
🚨︎ report
Attacking stock Apache with Slowloris DoS medium.com/@brannondorsey…
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/brannondorsey
πŸ“…︎ Jun 10 2017
🚨︎ report
sloww - the Slowloris attack CLI built in Node github.com/ethanent/sloww
πŸ‘︎ 21
πŸ’¬︎
πŸ‘€︎ u/Etha_n
πŸ“…︎ Feb 17 2018
🚨︎ report
Low-volume, low-bandwidth HTTP DoS - SlowLoris ha.ckers.org/slowloris/
πŸ‘︎ 76
πŸ’¬︎
πŸ‘€︎ u/jvnk
πŸ“…︎ Dec 08 2010
🚨︎ report
Apache 2 - A dance with Slowloris whoneedsactions.com/blog/…
πŸ‘︎ 3
πŸ’¬︎
πŸ‘€︎ u/TNvia
πŸ“…︎ Nov 26 2017
🚨︎ report
maxkrivich/SlowLoris github.com/maxkrivich/slo…
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/maxmen754
πŸ“…︎ Jul 31 2017
🚨︎ report
Slowloris DOS tutorial (animated) youtube.com/watch?v=W2LfG…
πŸ‘︎ 50
πŸ’¬︎
πŸ‘€︎ u/HackHut
πŸ“…︎ Mar 10 2017
🚨︎ report
slowloris atack

A friend decided it is funny to atack my website with slowloris. My vps got completly destroyed. I can't login to ssh. Website is down. VPS support told me it's very hard to detect those types of atacks.

How can I prevent this from happening again?-

πŸ‘︎ 22
πŸ’¬︎
πŸ‘€︎ u/cefege
πŸ“…︎ Dec 16 2012
🚨︎ report
πŸ‘︎ 36
πŸ’¬︎
πŸ‘€︎ u/michael003
πŸ“…︎ Jun 18 2009
🚨︎ report
Attacking stock Apache with Slowloris DoS medium.com/@brannondorsey…
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/brannondorsey
πŸ“…︎ Jun 10 2017
🚨︎ report
Mitigating the Slowloris HTTP DoS attack ak.soup.io/post/21743603/…
πŸ‘︎ 33
πŸ’¬︎
πŸ‘€︎ u/_ak
πŸ“…︎ Jun 20 2009
🚨︎ report
Low Bandwidth DoS Tool: Slowloris n0where.net/low-bandwidth…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/0xFR
πŸ“…︎ Nov 13 2016
🚨︎ report
Its a video of a slow loris... What more do you want /r/slowloris? youtube.com/watch?v=w89bF…
πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/sporkasoris
πŸ“…︎ Apr 18 2012
🚨︎ report
Is the Slowloris (layer 7 DoS attack) executable internally?

Currently, I'm writing a security analysis report on one of the computer labs at my university and I'm just wondering, if the slowloris script (or any other layer 7 dos script) was planted onto one of the lab PCs and was then launched when internet access is available, targetted at the university web server, would it have any affect on the university network? Or would it be completely counter productive? In my head, running the script against the network from within the network would disrupt service and prevent any user from establishing a HTTP connection to anywhere outside of the university.

Layer 7 DoS attack;

  • Apache, Goahead and dhttpd servers vulnerable.
  • Continuously sends poisonous/incomplete HTTP requests to the server to fill the queue and deny access to any legitimate users.
  • Completely bandwidth free.

Any thoughts or input?

References would be extremely helpful for learning purposes and building up knowledge of the layer 7 DoS attack.

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/sevaaraii
πŸ“…︎ Apr 08 2014
🚨︎ report
What do you call a man with no arms or legs in a hole?

Phil

πŸ‘︎ 5k
πŸ’¬︎
πŸ‘€︎ u/Rumblebully
πŸ“…︎ Jun 30 2021
🚨︎ report
Did you know Bruce Lee has a faster older brother?

Sudden Lee

πŸ‘︎ 9k
πŸ’¬︎
πŸ“…︎ Jul 02 2021
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.