Attacks to do a dos attack on web servers

Assignment Help Basic Computer Science
Reference no: EM13936255

We have studied in class how to use a variety of "slow" attacks to do a DoS attack on Web Servers. These attacks include SlowLoris, RUDY, Slow Reads etc. Perhaps the easiest such attack is SlowLoris. Recall that in this attack, a client sets up a connection to the server, starts a valid HTTP Get request, and then keeps sending headers (including junk headers) every so often, without finishing.

This ties up a server thread. If we tie up all server threads, we've dosed the server! This project has two parts. For both, you need to have a vulnerable version of HTTPD running in a VM. The stuff you get by default (typically 2.4.7 these days) will resist these attacks, especially on Linux distros.

You will research to find out which versions of HTTPD are vulnerable to these attacks, or whether the current versions can be made vulnerable by tinkering with their parameters and modules. In a different VM, you will need to run the attack. The VMs can both be on your own machine in host only mode networking. In the first part of the attack, I want you to download a tool called slowhttptest. aptget install slowhttptest should do the trick in Ubuntu.

Now run the four built in attacks against your server. Vary the number of threads available for your server, and see what parameters you have to adjust in the attack to succeed. Log these parameters. Also verify if the new httpd server is immune to these attacks. In the second part, I want you to understand and then code a client for the the slowloris attack. One is built into the slowhttptest utility, and its code is freely available. There are other implementations as well.

The intent is NOT for you to copy this code and paste it in! I want you to understand the attack and write it yourself in your favourite language. Feel free to look at the existing code for help, but acknowledge that explicitly in your readme by saying what parts you coded yourself and where you had help. It is OK to discuss the high level elements of the code with your friends, but not the code itself. Before you proceed, please remember the discussion in the very first class around Ethics.

This is only to be done on the resources that have been assigned for this project . Please do not try this on any other machine. If you do this on any live network, you're probably breaking several criminal statutes that attract strict penalties.

Reference no: EM13936255

Questions Cloud

Explain what is useful or problematic in his approach : To prepare for this Discussion, review the resources. Post your perspective on Holland's properties and mechanisms of complex adaptive systems. Next, explain what is useful and/or problematic in his approach
Calculate the price elasticity of demand for medium pizzas : Calculate the price elasticity of demand for medium pizzas for SUNY Canton students. You must show your work to receive credit for your calculation. If the price of pizza increases by 1%, by what will the percentage change in quantity demanded of ..
Couple without children traveling in japan : Topic: Couple without children traveling in Japan. written report outlining the eight step process which include 1. Understand the market environment 2. Set specific objectives
What is the attraction of foreign investment to uk investors : Explain how low UK interest rates can affect the tendency of UK-based MNCs to invest abroad. In general terms, what is the attraction of foreign investments to UK investors?
Attacks to do a dos attack on web servers : We have studied in class how to use a variety of "slow" attacks to do a DoS attack on Web Servers. These attacks include SlowLoris, RUDY, Slow Reads etc. Perhaps the easiest such attack is SlowLoris. Recall that in this attack, a client sets up a ..
Would expect a sin tax that raises the price of crack 15% : Given what you know about the price elasticity of demand and addictive properties of crack, would you expect a sin tax that raises the price of crack by 15% to decrease the sale of crack by more than or less than 15%? Explain your answer.
Case study-high ranking team from fuji heavy industries : A high ranking team from Fuji Heavy Industries, owners of the Subaru brand, recently said that Oman will remain a top priority market for the company in the coming years. The market share for Subaru in Oman is around two per cent which is double i..
Characteristic phases of development of historical humanity : Characteristic phases of development of historical humanity - Question on Characteristic phases of development of historical humanity
Programming in three different languages for dijkstra : Write a program that will compute the shortest-path tree rooted at nodes as noted in the networks (Figure 1, 2, and 3) provided below by using the Dijsktra algorithm, as explained in the class and in the book. You can use any programming language ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What staffing we would need for two possible scenarios

What could those be? If we outsource would we need to have someone from the company that monitors them? What skills or knowledge would they need.

  Formulate the lp model for union city to minimize

Relevant information on the six potential locations of the warning siren towers and distance in miles to each of the seven schools is presented in the table below. Formulate the LP model for Union City to minimize towers built.

  Which can be categorized as host ids and network ids

which can be categorized as Host IDS and Network IDS

  Deliver to match the challenge of the digital age

Discuss how one of these industries has reacted. Has it found ways to reinvent the products and services they deliver to match the challenge of the Digital Age?

  Explain the different modes of data transfer

Explain the different modes of data transfer

  Driving force causing this evolution

Discuss the evolution of client-server computing from file server to multilayer applications to Web-based applications. What has been the driving force causing this evolution? Where do you think network computing will be in the next five years? Ten y..

  Specific role an information system

What is a specific role an information system can play in an organization? What are three components of this system? How do they work in the enterprise?

  Essay on the topic of digital divide crosses borders

Digital divide crosses all borders, culturally and geographically, discuss how the digital divide affects society in 2014.

  Design a program flowchart that asks user to enter integers

Design a program flowchart that asks the user to enter three integers and the programs finds and displays the minimum and the maximum of these three integers. Please use "click chart" to draw the flowchart of your design.

  Display the highpints variable

Add an assignment statement that sets counter to 1. Remember, counter has to be set to one because Raptor arrays must start at 1, not 0.

  Write a python function celcius fahrenheit

Write a python function celcius_fahrenheit wich takes temperature values from a list and changes them into fahrenheit values.

  Look up the programming design/troubleshooting tool

You will have to look this up on the web.  I recommend use the following key words: Desk check Programing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd