module
Slowloris Denial of Service Attack
Disclosed | Created |
---|---|
2009-06-17 | 2018-06-14 |
Disclosed
2009-06-17
Created
2018-06-14
Description
Slowloris tries to keep many connections to the target web server open and hold them open as long as possible.
It accomplishes this by opening connections to the target web server and sending a partial request.
Periodically, it will send subsequent HTTP headers, adding to-but never completing-the request.
Affected servers will keep these connections open, filling their maximum concurrent connection pool,
eventually denying additional connection attempts from clients.
It accomplishes this by opening connections to the target web server and sending a partial request.
Periodically, it will send subsequent HTTP headers, adding to-but never completing-the request.
Affected servers will keep these connections open, filling their maximum concurrent connection pool,
eventually denying additional connection attempts from clients.
Authors
RSnake
Gokberk Yaltirakli
Daniel Teixeira
Matthew Kienow matthew_kienow[AT]rapid7.com
Gokberk Yaltirakli
Daniel Teixeira
Matthew Kienow matthew_kienow[AT]rapid7.com
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.