07:14 PM
Connect Directly
Repost This

Researcher To Release Free 'Slow HTTP Attack' Tool

'Slowhttptest' could be expanded to test for so-called "ApacheKiller" hack

Slow HTTP attacks can be a lethal form of denial of service to Web servers: they are easy to perform and require minimal computing resources, and they are tough to detect until it's too late. So a researcher is releasing a new open-source tool he wrote that checks a server's vulnerability to such an attack.

The new "slowhttptest" tool, written by Sergey Shekyan, senior software engineer at Qualys, says his tool was inspired by similar open-source tools, Slowloris, and OWASP's Slow HTTP Post tools, and includes some of their features as well as new configurable parameters and other features.

The Slowloris HTTP DDoS tool keeps connections open by sending partial HTTP requests and sends headers at regular intervals to prevent the sockets from closing. The slow HTTP POST DDoS tool simulates an attack using POST headers with a legitimate "content-length" field that lets the Web server know how much data is arriving. Once the headers are sent, the POST message body is transmitted at a slow speed to gridlock the connection and use server resources.

Shekyan says his tool lets organizations see their server's vulnerabilities to these types of attacks, so they can better configure them to resist HTTP-layer DDoS attacks. The tool opens customized, slow connections to the server so you can see where it's prone to such attacks. "There is no patch for these slow attacks -- no universal recommendations. It depends on your particular system," he says.

The Slow HTTP DDoS works because of the way the HTTP protocol works: the server must have received a completed HTTP request before it's processed. "If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data," Shekyan says.

Shekyan says slowhttptest could be expanded to test for the so-called "ApacheKiller" hack. "They are related in terms that both attacks are able to consume server resources with minimal traffic footprint. Slow HTTP attacks are not targeting a specific platform like Apache, but are universal and work against pretty much all known HTTP servers," he says.

The slowhttpest is available here for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web