

There is also a 15-second latency proof that denial of service works.Īfter 10 minutes, the program is stopped so that you can see an average latency of 14.7 seconds. We now try to keep them open as long as possible.Īfter 15 seconds, we try to create new connections to reach 1000 open connections.Īfter 5 minutes, you can see that we have 408 open sockets. We notice here that we managed to initialize only 279 sockets out of 1000 planned.

It is therefore noticeable that the latency time is relatively low. In the second step, the initial latency is displayed: server running with Apache, best configuration for this attack The program ran with the following command:Īt first, the console shows us that we are on an Apache server, which is perfect for our attack. The results below were performed on an Apache server with the initial configuration. The request makes a get on the host entered by the user and retrieves the time between sending and answering the request. The commands to be executed to have an execution environment are the following:
SLOWLORIS ATTACK ON PC IP INSTALL
It is necessary to install some dependencies. If none of these solutions are available, it is always possible to place your web server behind an Nginx or lighthttpd. There are other methods to protect yourself, such as installing a: There are modules for Apache that reduce the chance of a Slowloris attack such as:

The servers mostly affected by the Slowloris attack are: Affected servers will see their maximum number of connections reached and may refuse new user connections. As soon as Slowloris has opened a connection, it will keep it open by sending incomplete requests that it will slowly complete as it goes along but will never finish them. It tries to keep as many connections open with the target web server as possible and tries to keep them open as long as possible. The Slowloris attack allows a user to DDOS a server using only one machine.
