All Projects → NoraCodes → rloris

NoraCodes / rloris

Licence: other
A Rust implementation of slow HTTP DoS techniques

Programming Languages

rust
11053 projects

Projects that are alternatives of or similar to rloris

SAP vulnerabilities
DoS PoC's for SAP products
Stars: ✭ 47 (+74.07%)
Mutual labels:  denial-of-service
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+425.93%)
Mutual labels:  denial-of-service
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+14085.19%)
Mutual labels:  denial-of-service
Raven-Storm
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Stars: ✭ 235 (+770.37%)
Mutual labels:  denial-of-service
ddos
Simple dos attack utility
Stars: ✭ 36 (+33.33%)
Mutual labels:  denial-of-service
cve-2021-3449
CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻
Stars: ✭ 220 (+714.81%)
Mutual labels:  denial-of-service
rc4md5cry
rc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-44.44%)
Mutual labels:  denial-of-service
MemStream
MemStream: Memory-Based Streaming Anomaly Detection
Stars: ✭ 58 (+114.81%)
Mutual labels:  denial-of-service
sledgehammer
🔨 📶 WiFi-Jammer/DoS toolset
Stars: ✭ 34 (+25.93%)
Mutual labels:  denial-of-service
Samsung-TV-Denial-of-Service-DoS-Attack
Samsung TV Denial of Service (DoS) Attack
Stars: ✭ 28 (+3.7%)
Mutual labels:  denial-of-service

rloris

rloris is an implementation of RSnake's SlowLoris attack in Rust, with other attacks on the way.

You can either build rloris yourself with cargo or download a working binary for Linux x64 from the releases directory. As of 0.6.0, rloris no longer requires native SSL libraries and uses rustls to perform all TLS connection in pure Rust.

Attacks

  • SlowLoris GET, based on RSnake's original attack, simply opens a lot of connections asking to GET resources and then takes its time sending the other headers and the final double \r\n.
  • SlowLoris POST, similar to the above but using POST requests. Activate with rloris post <target> --post.

Functionality

Optional functionality is available by giving flags to the rloris binary. Currently, rloris supports SSL (-ssl), setting custom timeouts for SlowLoris (--timeout=<timeout>) and SlowLoris cycle counts (--cycle=<cycles>), multithreading (--thread=<threads>), and infinite repetition (--repeat).

WARNING: using --repeat can create a real honest to goodness DoS condition on the target!

Advice

The more threads you can get away with, the higher the impact on the target. To see what your server can handle, keep raising the number of threads until you get "Connection reset by peer" errors; at that point, your server is dropping connections due to over-load. Note that a DoS condition probably will arise before this happens.

rloris uses env_logger to log messages to the console; set the environment variable RUST_LOG to info for additional data about your attacks, or debug if you're hacking on the code.

Examples

  • Perform an attack against localhost, port 8000, using the POST verb: rloris post localhost --port=8000
  • Perform an SSL attack against example.com, port 443: rloris get example.com --ssl
  • Perform an SSL attack against 127.0.0.1, with domain name example.com: rloris get 127.0.0.1 --ssl --domain=example.com --repeat
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].