Slowloris – HTTP DoS Tool in PERL

Outsmart Malicious Hackers


This tool has been hitting the news, including some mentions in the SANS ISC Diary.

It’s not actually a new attack (it’s been around since 2005) but this is the first time a packaged tool has been released for the attack.

Slowloris holds connections open by sending partial HTTP requests. It continues to send subsequent headers at regular intervals to keep the sockets from closing. In this way webservers can be quickly tied up. In particular, servers that have threading will tend to be vulnerable, by virtue of the fact that they attempt to limit the amount of threading they’ll allow.

Slowloris must wait for all the sockets to become available before it’s successful at consuming them, so if it’s a high traffic website, it may take a while for the site to free up it’s sockets. So while you may be unable to see the website from your vantage point, others may still be able to see it until all sockets are freed by them and consumed by Slowloris. This is because other users of the system must finish their requests before the sockets become available for Slowloris to consume. If others re-initiate their connections in that brief time-period they’ll still be able to see the site.

So it’s a bit of a race condition, but one that Slowloris will eventually always win – and sooner than later.

Slowloris lets the webserver return to normal almost instantly (usually within 5 seconds or so). That makes it ideal for certain attacks that may just require a brief down-time.

This affects a number of webservers that use threaded processes and ironically attempt to limit that to prevent memory exhaustion – fixing one problem created another. This includes but is not necessarily limited to the following:

  • Apache 1.x
  • Apache 2.x
  • dhttpd
  • GoAhead WebServer
  • Squid

There are a number of webservers that this doesn’t affect as well, in the authors testing:

  • IIS6.0
  • IIS7.0
  • lighttpd
  • nginx
  • Cherokee (verified by user community)

You can download Slowloris here:

slowloris.pl

Or read more here.

Learn about Exploits/Vulnerabilities



Posted in: Exploits/Vulnerabilities, Networking Hacking, Web Hacking

, , , , ,

Latest Posts:


AWSBucketDump - AWS S3 Security Scanning Tool AWSBucketDump – AWS S3 Security Scanning Tool
AWSBucketDump is an AWS S3 Security Scanning Tool, which allows you to quickly enumerate AWS S3 buckets to look for interesting or confidential files.
nbtscan Download - NetBIOS Scanner For Windows & Linux nbtscan Download – NetBIOS Scanner For Windows & Linux
nbtscan is a command-line NetBIOS scanner for Windows that is SUPER fast, it scans for open NetBIOS nameservers on a local or remote TCP/IP network.
Equifax Data Breach - Hack Due To Missed Apache Patch Equifax Data Breach – Hack Due To Missed Apache Patch
The Equifax data breach is pretty huge with 143 million records leaked from the hack in the US alone with unknown more in Canada and the UK.
Seth - RDP Man In The Middle Attack Tool Seth – RDP Man In The Middle Attack Tool
Seth is an RDP Man In The Middle attack tool written in Python to MiTM RDP connections by attempting to downgrade the connection to extract clear text creds
dcrawl - Web Crawler For Unique Domains dcrawl – Web Crawler For Unique Domains
dcrawl is a simple, but smart, multithreaded web crawler for randomly gathering huge lists of unique domain names. It will branch out indefinitely.
Time Warner Hacked - AWS Config Exposes 4M Subscribers Time Warner Hacked – AWS Config Exposes 4M Subscribers
What's the latest on the web, Time Warner Hacked is what it's about now as a bad AWS S3 config (once again) exposes the details of approximately 4M subs.


5 Responses to Slowloris – HTTP DoS Tool in PERL

  1. Greg June 23, 2009 at 10:06 am #

    As i saw it appearing on Milw0rm, i knew this will be a headliner :)

  2. Motoma June 23, 2009 at 6:08 pm #

    There is a python version of this titled PyLoris which runs in Windows, Linux, and Mac OS X.

  3. David June 23, 2009 at 6:12 pm #

    Another great sharing from RSnake. Tool very well developed and I already tested with success on my home pen-testing. Top of the news!

  4. droope June 24, 2009 at 2:41 am #

    uh, that seems like a fun tool.

    I can smell all fellow script kiddies enjoying this.

  5. Jeff Price June 24, 2009 at 6:38 pm #

    I wrote this version a few years ago in bash

    #!/bin/bash
    while true; do
    printf “GET / HTTP/1.0\n”|nc $1 80 &
    done