http-slowloris-check
脚本使用类型:
portrule
脚本所属分类:
vuln, safe
脚本下载地址: http://nmap.org/svn/scripts/http-slowloris-check.nse
Tests a web server for vulnerability to the Slowloris DoS attack without actually launching a DoS attack.
Slowloris was described at Defcon 17 by RSnake (see http://ha.ckers.org/slowloris/).
This script opens two connections to the server, each without the final CRLF. After 10 seconds, second connection sends additional header. Both connections then wait for server timeout. If second connection gets a timeout 10 or more seconds after the first one, we can conclude that sending additional header prolonged it's timeout and that the server is vulnerable to slowloris DoS attack.
You can specify custom http User-agent field with http.useragent
script argument.
Idea from Qualys blogpost: * https://community.qualys.com/blogs/securitylabs/2011/07/07/identifying-slow-http-attack-vulnerabilities-on-web-applications
Specifies custom user agent string.
执行格式
nmap --script http-slowloris-check <target>
PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-slowloris-check: | VULNERABLE: | Slowloris DOS attack | State: VULNERABLE | Description: | Slowloris tries to keep many connections to the target web server open and hold them open as long as possible. | It accomplishes this by opening connections to the target web server and sending a partial request. By doing | so, it starves the http server's resources causing Denial Of Service. | | Disclosure date: 2009-09-17 | References: |_ http://ha.ckers.org/slowloris/
Author: Aleksandar Nikolic
License: VER007 整理 http://www.ver007.com