New HTTP POST DDoS Attack Tools ReleasedVery slooowwww HTTP POST connections wage denial-of-service attack on Web-based servers
Two free tools have been unleashed that exploit the recently demonstrated slow HTTP POST attack that takes advantage of a generic flaw in HTTP -- the so-called "R U Dead Yet?" tool and the OWASP HTTP POST Tool.
(click image for larger view)
Slide Show: DDoS With The Slow HTTP POST Attack
Researchers at last month's OWASP 2010 Application Security Conference in Washington, D.C., demonstrated how the HTTP protocol leaves the door open for attackers to wage a new form of distributed denial-of-service (DDoS) attack that floods Web servers with very slow HTTP "POST" traffic.
Researcher Wong Onn Chee, who first discovered the attack in 2009 with a team of researchers in Singapore, and Tom Brennan, a security researcher with Proactive Risk, also demonstrated how an online game could be used as a means of recruiting bots for an "agentless" botnet that executes this HTTP POST DDoS attack. Chee says HTTP is broken and that all Web-based servers or systems with a Web interface are vulnerable to this attack. "If it has a Web interface, we can knock it down [with this attack]," Chee said earlier this month.
Independent researcher Raviv Raz unleashed "R U Dead Yet?" early last week, and then Chee and Brennan pushed out their tool on Thanksgiving Day.
Ryan Barnett, senior security researcher with Trustwave's SpiderLabs, has been testing the tools and devised some mitigation strategies using the open-source ModSecurity Web application firewall and Apache, namely specifying different thresholds for receiving data. Barnett uses the timely analogy of airport security screening to explain what happens in a HTTP POST attack: Unlike a traditional denial-of-service attack where there are just too many business-type frequent flyers in line to get the traffic through quickly, he says, this new "connection consumption" type of attack is like a relatively short line of travelers going through security -- most of whom are families with kids, strollers, and other items that take longer to screen.
"And just when you think the group is going to make it through, the metal detector sounds and the whole group has to go back through the process again. This is essentially what is happening with these slow HTTP requests," Barnett says. "They are sending data very slowly, and just when the Web server's timeout thresholds are about to be exceeded, they send a little more data."
An HTTP POST attack sends POST headers that let the server know how much data is arriving, but when it does the message body is sent a very slow speed to jam the connection and sap server resources. According to Chee, this attack can take down a website within minutes using just tens of thousands of slow HTTP POST connections.
Click here to view Onn Chee and Brennan's slides from their recent OWASP presentation.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio