Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: [NSE] http-slowloris, check if a webserver is prone to the Slowloris DoS attack
From: Gutek <ange.gutek () gmail com>
Date: Tue, 17 May 2011 19:22:16 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Le 17/05/2011 13:56, Toni Ruottu a écrit :
Did you run into further problems, or is the script just lacking polish?

No, I want to run further tests against different situations before
submiting the new script which is, as it seems at this moment, better
than the previous one. In the meanwhile, I'm also writing some words
about the slowloris attack, its conditions and something helpfull to
find potential targets that have a profile prone to this attack. This
will be usefull for those who want to test the script.

(hm... yep, it also needs some polish as usual, but I'll submit it 'as
it' first)

Thanks for your interest, be assured that I'm not giving up yet :)

A.G.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.12 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org/

iEYEARECAAYFAk3SrsgACgkQ3aDTTO0ha7gCXACeIA8shUzgGiwy+9nCe+ADINYl
HdcAnjsiyVI1OVwCmVTH5n9Q8cTP9TBd
=dDyJ
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]