slowloris 0.2.6+git20230430.890f72d-2 source package in Ubuntu

Changelog

slowloris (0.2.6+git20230430.890f72d-2) unstable; urgency=medium

  * Source-only upload to allow testing migration 

 -- Josenilson Ferreira da Silva <email address hidden>  Sat, 03 Feb 2024 12:04:40 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
all
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe misc
Noble release universe misc

Builds

Noble: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
slowloris_0.2.6+git20230430.890f72d-2.dsc 2.1 KiB 799126c2430791c1dfdd6ee1a07d49dbb98e5e6f9f38550f9e6963192610743f
slowloris_0.2.6+git20230430.890f72d.orig.tar.xz 4.3 KiB 21f346744b971c7b3d06acc61fc17935e4acb7feb7118b20ad3d3af9b6f1e251
slowloris_0.2.6+git20230430.890f72d-2.debian.tar.xz 3.4 KiB 13752a6f0fef06e130c505868617ae9369c84913adc4c19abe5be88cc8a2b037

No changes file available.

Binary packages built by this source

slowloris: Security testing tool for web servers

 Open source tool used to perform Denial of Service (DoS) attacks on web
 servers. Slowloris exploits a vulnerability in web servers called “Keep-Alive”
 to exhaust server resources and make them inaccessible.
 .
 Slowloris offers a number of configurable options, allowing fine-grained
 control over request behavior. Some of which include:
  - Web Server Port: It is possible to specify the web server port to be
    the target of the action, usually port 80.
  - Number of Sockets: You can determine the number of simultaneous sockets
    that the tool will use to send requests to the server.
  - Log Increase (Verbose): The level of detail of the information logged
    during the run can be adjusted, allowing a more detailed analysis of the
    results.
  - User agent randomization: Slowloris can randomize user agents on each
    request, making it difficult to detect the destination server.
  - Use of SOCKS5 proxy: The tool supports the use of a SOCKS5 proxy to further
    hide the source of requests.
  - Use of HTTPS for Requests: In addition, it is possible to configure the
    tool to use the HTTPS protocol for requests, adding another layer of
    obscurity.
  - Time interval between headers: You can specify a time interval between
    sending request headers, controlling the rate of requests.