Risk
8/25/2011
07:14 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Researcher To Release Free 'Slow HTTP Attack' Tool

'Slowhttptest' could be expanded to test for so-called "ApacheKiller" hack

Slow HTTP attacks can be a lethal form of denial of service to Web servers: they are easy to perform and require minimal computing resources, and they are tough to detect until it's too late. So a researcher is releasing a new open-source tool he wrote that checks a server's vulnerability to such an attack.

The new "slowhttptest" tool, written by Sergey Shekyan, senior software engineer at Qualys, says his tool was inspired by similar open-source tools, Slowloris, and OWASP's Slow HTTP Post tools, and includes some of their features as well as new configurable parameters and other features.

The Slowloris HTTP DDoS tool keeps connections open by sending partial HTTP requests and sends headers at regular intervals to prevent the sockets from closing. The slow HTTP POST DDoS tool simulates an attack using POST headers with a legitimate "content-length" field that lets the Web server know how much data is arriving. Once the headers are sent, the POST message body is transmitted at a slow speed to gridlock the connection and use server resources.

Shekyan says his tool lets organizations see their server's vulnerabilities to these types of attacks, so they can better configure them to resist HTTP-layer DDoS attacks. The tool opens customized, slow connections to the server so you can see where it's prone to such attacks. "There is no patch for these slow attacks -- no universal recommendations. It depends on your particular system," he says.

The Slow HTTP DDoS works because of the way the HTTP protocol works: the server must have received a completed HTTP request before it's processed. "If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data," Shekyan says.

Shekyan says slowhttptest could be expanded to test for the so-called "ApacheKiller" hack. "They are related in terms that both attacks are able to consume server resources with minimal traffic footprint. Slow HTTP attacks are not targeting a specific platform like Apache, but are universal and work against pretty much all known HTTP servers," he says.

The slowhttpest is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2963
Published: 2014-07-10
Multiple cross-site scripting (XSS) vulnerabilities in group/control_panel/manage in Liferay Portal 6.1.2 CE GA3, 6.1.X EE, and 6.2.X EE allow remote attackers to inject arbitrary web script or HTML via the (1) _2_firstName, (2) _2_lastName, or (3) _2_middleName parameter.

CVE-2014-3310
Published: 2014-07-10
The File Transfer feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center does not verify that a requested file was an offered file, which allows remote attackers to read arbitrary files via a modified request, aka Bug IDs CSCup62442 and CSCup58463.

CVE-2014-3311
Published: 2014-07-10
Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco WebEx Meetings Server and WebEx Meeting Center allows remote attackers to execute arbitrary code via crafted data, aka Bug IDs CSCup62463 and CSCup58467.

CVE-2014-3315
Published: 2014-07-10
Cross-site scripting (XSS) vulnerability in viewfilecontents.do in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCup76308.

CVE-2014-3316
Published: 2014-07-10
The Multiple Analyzer in the Dialed Number Analyzer (DNA) component in Cisco Unified Communications Manager allows remote authenticated users to bypass intended upload restrictions via a crafted parameter, aka Bug ID CSCup76297.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.