File: control

package info (click to toggle)
slowloris 0.2.6%2Bgit20230430.890f72d-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 104 kB
  • sloc: python: 222; makefile: 5
file content (42 lines) | stat: -rw-r--r-- 2,020 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Source: slowloris
Section: utils
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Josenilson Ferreira da Silva <nilsonfsilva@hotmail.com>
Rules-Requires-Root: no
Build-Depends: debhelper-compat (= 13),
               dh-sequence-python3,
               python3-all,
               python3-setuptools
Standards-Version: 4.6.2
Homepage: https://github.com/gkbrk/slowloris
Vcs-Browser: https://salsa.debian.org/pkg-security-team/slowloris
Vcs-Git: https://salsa.debian.org/pkg-security-team/slowloris.git

Package: slowloris
Architecture: all
Depends: ${misc:Depends},
         ${python3:Depends}
Description: Security testing tool for web servers
 Open source tool used to perform Denial of Service (DoS) attacks on web
 servers. Slowloris exploits a vulnerability in web servers called “Keep-Alive”
 to exhaust server resources and make them inaccessible.
 .
 Slowloris offers a number of configurable options, allowing fine-grained
 control over request behavior. Some of which include:
  - Web Server Port: It is possible to specify the web server port to be
    the target of the action, usually port 80.
  - Number of Sockets: You can determine the number of simultaneous sockets
    that the tool will use to send requests to the server.
  - Log Increase (Verbose): The level of detail of the information logged
    during the run can be adjusted, allowing a more detailed analysis of the
    results.
  - User agent randomization: Slowloris can randomize user agents on each
    request, making it difficult to detect the destination server.
  - Use of SOCKS5 proxy: The tool supports the use of a SOCKS5 proxy to further
    hide the source of requests.
  - Use of HTTPS for Requests: In addition, it is possible to configure the
    tool to use the HTTPS protocol for requests, adding another layer of
    obscurity.
  - Time interval between headers: You can specify a time interval between
    sending request headers, controlling the rate of requests.