Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [NSE] http-slowloris, check if a webserver is prone to the Slowloris DoS attack
From: Gutek <ange.gutek () gmail com>
Date: Sat, 30 Apr 2011 11:19:29 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Le 30/04/2011 10:38, Toni Ruottu a écrit :
So the current hypothesis would be that NSE has some hidden connection
limit, that perl does not have?


I didn't want to say that explicitly because I'm not expert enough, but
that's my feeling, yes.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.12 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org/

iEYEARECAAYFAk271CEACgkQ3aDTTO0ha7ijygCePgAQT17/YqzSkt0f4qqw66aS
SnUAn3rmVB+/B5mBRgicmN9qfqOi/bhr
=gpQv
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault