Nmap Development mailing list archives

[NSE] http-slowloris-check


From: Aleksandar Nikolic <nikolic.alek () gmail com>
Date: Tue, 21 Aug 2012 21:25:42 +0200

Hi all,

I've written this more server friendly version of Slowloris DoS check.

It's pretty simple really. It makes two requests to the server, each
without the final CRLF. The second request differs from the first
in that it waits for 10 seconds and then sends additional header, as
slowloris attack would. Both requests then wait until they get a
connection reset from the server due to timeout.
On non-vulnerable servers, both requests should timeout at the same
time. If second request timeouts at least 10 seconds after the first, we
assume that it's timeout was prolonged by additional header and we
can therefore conclude that it is vulnerable to slowloris DoS attack.

Check the script and tell me what you think, I always welcome ideas
for improvements.

Aleksandar

Attachment: http-slowloris-check.nse
Description:

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/

Current thread: