Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - New slow-motion DoS attack: just a few PCs, little (arstechnica.com)

An anonymous reader writes: The attack is new in that it uses reading rather than POST, and limits the server response, filling up the write buffer on the server end. There are other recent attack tools that do something similar, but this tool achieves it just by limiting the response with an ACK that sends a low or zero window value. Sockstress does this, but it uses raw sockets; this attack is simpler because it only uses the TCP Sockets API. So, the vulnerability isn't new; the attack style is an evolution of the slow attack approach. It's still worth noting because of the large number of websites that are potentially vulnerable to this and the relatively low bandwidth requirements of the attack.
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

New slow-motion DoS attack: just a few PCs, little

Comments Filter:

Can't open /usr/fortunes. Lid stuck on cookie jar.

Working...