Nmap Development mailing list archives
[NSE] http-slowloris-check
From: Aleksandar Nikolic <nikolic.alek () gmail com>
Date: Tue, 21 Aug 2012 21:25:42 +0200
Hi all, I've written this more server friendly version of Slowloris DoS check. It's pretty simple really. It makes two requests to the server, each without the final CRLF. The second request differs from the first in that it waits for 10 seconds and then sends additional header, as slowloris attack would. Both requests then wait until they get a connection reset from the server due to timeout. On non-vulnerable servers, both requests should timeout at the same time. If second request timeouts at least 10 seconds after the first, we assume that it's timeout was prolonged by additional header and we can therefore conclude that it is vulnerable to slowloris DoS attack. Check the script and tell me what you think, I always welcome ideas for improvements. Aleksandar
Attachment:
http-slowloris-check.nse
Description:
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- [NSE] http-slowloris-check Aleksandar Nikolic (Aug 21)
- Re: [NSE] http-slowloris-check Arturo 'Buanzo' Busleiman (Aug 21)
- Re: [NSE] http-slowloris-check Aleksandar Nikolic (Aug 24)
- Re: [NSE] http-slowloris-check Arturo 'Buanzo' Busleiman (Aug 27)
- Re: [NSE] http-slowloris-check Peter O (Aug 27)
- Re: [NSE] http-slowloris-check Aleksandar Nikolic (Aug 24)
- Re: [NSE] http-slowloris-check Arturo 'Buanzo' Busleiman (Aug 21)