Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [NSE] http-slowloris, check if a webserver is prone to the Slowloris DoS attack
From: Gutek <ange.gutek () gmail com>
Date: Thu, 14 Apr 2011 18:08:34 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Le 14/04/2011 17:41, Toni Ruottu a écrit :
Also, I wonder if the script should use verbose output instead of
debugging output.

On Sun, Apr 10, 2011 at 5:44 PM, Toni Ruottu <toni.ruottu () iki fi> wrote:
I would change the output to something like

 | http-slowloris:
 |   Vulnerable
 |   The DoS attack took +3m40s
 |   with 32 concurrent connections
 |_  and 66 sent queries

Thanks Toni for your suggestions. Unfortunately I'll be abroad for a
week, but I will apply those remarks asap. Any other ideas during this
week are also welcome.

Thanks again and regards,

A.G.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.12 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org/

iEYEARECAAYFAk2nHAIACgkQ3aDTTO0ha7imOwCdFHeBymKMM+dlGxbMwKdFb4W/
clEAn3z3vIbZfHVQG/8xmzbsV+9T7CFo
=lcEB
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]