Express explanation: Imagine sending 100 old grandmas to a convenience store, with all of them trying to tell a story from their childhood to the cashier so that no other customers can buy anything.
@MegaZsolti7 жыл бұрын
Yeah, while forgetting their stories halfway through and starting all over.
@ArunBasilLal7 жыл бұрын
You should be on ELI5 subreddit.
@Kodufan6 жыл бұрын
shouldn't you be busy saving the world, Niko?
@godfreypoon51486 жыл бұрын
That variation of the attack is described in more detail in this video watch?v=tc_KJEwzq74
@danielsharp24026 жыл бұрын
That's a clever IRL DoS.
@Energya018 жыл бұрын
This is now my favorite Denial of Service attack as well
@TheAnimystro8 жыл бұрын
indeed
@chainingsolid8 жыл бұрын
same I was laughing alot at how simple but effective this is.
@CGoody5648 жыл бұрын
Chaining Solid not really effective anymore except for unpatched web servers. but yeah, genius in it's conception by using the artificial limits used to stop DDoS against the server to DDoS it anyway. lol
@RealNovgorod8 жыл бұрын
Yeah, except it's useless because every sensible webserver has a connection limit per client or IP (something on the order of 2-10, beyond that you're blocked). It's true that it saves traffic, but there's no way around owning a botnet...
@murphy540008 жыл бұрын
could just go through a few proxies/VPNs if you really needed to do it solo.
@WAMProducties8 жыл бұрын
The first rule of coding: All user input is evil.
@TechyBen8 жыл бұрын
Second rule of coding: Checking rule 1 is NP-hard!
@TheTrueSmitch8 жыл бұрын
Wouter Damen Ikr! All the parsing and data validation!
@greenanubis8 жыл бұрын
Like life: cant trust anyone. But obviously thats not the optimal strategy.
@simonfrohlich77668 жыл бұрын
So true!
@ibrax17 жыл бұрын
+TechyBen Why is it NP-hard?
@hrnekbezucha8 жыл бұрын
This is so beautifully evil it made me cry.
@power-max8 жыл бұрын
Dr EVIL would be proud!
@dvdr14eb8 жыл бұрын
Mojo Jojo would be proud
@RonJohn638 жыл бұрын
Cry? Like a girly man? This is so beautifully evil is makes me rage at myself for not thinking of it first!!
@sUmEgIaMbRuS7 жыл бұрын
And your comment made me WannaCry
@cameronbarrett98087 жыл бұрын
Ambrus Sümegi a
@paul35628 жыл бұрын
All Mikes videos seem to be so simple to follow and his presentation makes you want to follow.... Where were you when I was at school?
@astropgn8 жыл бұрын
Yeah, he should have a dedicated channel
@bl33kselderij8 жыл бұрын
It's also great how he has to add the obligatory 'don't really do this', but you can see in his eyes that he thinks this stuff is awesome ;-)
@dariusduesentrieb8 жыл бұрын
would be cool, but i think its more complicate that it seems to be here
@DamagedSave8 жыл бұрын
I am at the Uni he teaches at, very nice guy in general. Can occasionally hear him talking in an office and wonder if a new Computerphile video is on the way :)
@astropgn8 жыл бұрын
DamagedSave Go talk to him! Say we would like to see his channel :P
@rikwisselink-bijker8 жыл бұрын
I understand why this is his favorite. And I like the gleam in his eyes for this one..
@TTTT...3 ай бұрын
serious npc behaviour
@rikwisselink-bijker3 ай бұрын
@@TTTT... Who is the NPC exactly? I don't really understand what you mean
@dvdv77774 жыл бұрын
To add to that: Other webservers like nginx are not vulnerable to slowloris because they don't reserve a thread per connection. Instead, they have a worker thread pool. Each thread in that pool has a task queue. These threads run all tasks in their queues until the queues are empty. So, as soon as you insert a task in their queue, it eventually gets run. Every time a bit of data comes in from a client, a new task is created - "process this data". This task is then assigned to one of the worker threads whose task queue isn't full. The assigned thread then eventually runs the task. That way, even incredibly slowly arriving partial HTTP requests won't block anything, because the threads aren't exclusively reserved for handling one particular connection. The whole HTTP request handling is broken up into these small individual tasks instead.
@Dearth1234 жыл бұрын
I really needed this! Thank you for your clear writing.
@osenseijedi8 жыл бұрын
OMG! a computerphile that actually shows some code! Is it christmas or something?
@simonfrohlich77668 жыл бұрын
Well, seriously, you could probably find the code fairly quickly or writ it yourself knowing the idea behind it, so...
@xanderlewis7 жыл бұрын
I'm pleased too, but computer science/computing isn't ALL about code. :)
@shala_shashka7 жыл бұрын
tru tru
@aakksshhaayy7 жыл бұрын
but its in a noob language like python
@tapwater4247 жыл бұрын
>noob language aakksshhaayy is living in 2080 with his "assembly code only" ideology
@Gooberslot8 жыл бұрын
It seems weird that he's using the Ubuntu machine for browsing and the Windows machine for serving.
@tommessig20608 жыл бұрын
yeah, i was thinking the same thing. moreso that it's apache on windows.
@NickleJ8 жыл бұрын
That's what I was thinking. Though if you're deploying apache with the specific intention of breaking it, maybe windows is the better platform.
@matek99757 жыл бұрын
it doesn't matter and it's faster to install server on windows than on linux
@nimisidiv92447 жыл бұрын
He'll be using the university network which will most likely be windows enviroments.
@johnfrancisdoe15636 жыл бұрын
Nimisidiv Except the other machine is Linux. Anyway, installing Apatchy httpd on Linux is very fast it's an OS feature. But installing Monty Python etc. on Windows is harder than installing Apache, so if he only had those two machines it's just easier to do the python script on the Linux machine and use a badly configured toy web server on Windows as the target.
@mikopiko8 жыл бұрын
I love these kinds of videos. My favorite one is when tom scott talked about the NTP attack method.
@NeatNit8 жыл бұрын
One of my favorite computerphile videos in recent memory! Will you cover how servers would defend against this technique?
@bidaubadeadieu8 жыл бұрын
+ Yeah I'd love to know this too.
@NikkiDimesYT8 жыл бұрын
Use Lighttpd or nginx ;P
@sooooooooooomebody8 жыл бұрын
I wonder how many Apache threads some normal Linux box could handle.
@brodaclop8 жыл бұрын
One obvious answer is: don't spawn a new thread for every connection. If you keep your processing as lightweight as possible, attacks like this have a much smaller effect.
@sallerc8 жыл бұрын
You could also limit the number of open concurrent connections to the same IP.
@Dusk-MTG4 жыл бұрын
Dr. Mike Pound: writes 67 lines of codes and breakes a site Me: writes 5000 lines of codes and my program is still useless.
@arttu12294 жыл бұрын
Emanuele Giordano he didnt write it as he said
@baronvonbeandip3 жыл бұрын
Well, maybe you should drop H and do something in JS or Python
@reda291002 жыл бұрын
It's called denial of execution attack injected by the creator of the language to prevent your code from doing what you want it to do. Just like this very comment is denial of skill attack by me to prevent you .. [Okay, this joke took a mean turn, I'll stop now.]
@May-wh1rt5 жыл бұрын
I love the videos with Dr Pound, he's always so enthusiastic and speaks clearly.
@WWxeroWW.WERWKWWF__WPWWW.-_WWW8 жыл бұрын
thanks gonna use this on the scientology website now
@aybmnn8 жыл бұрын
lol
@ricodelta18 жыл бұрын
and if you did that on an islamic website, youd be called a racist
@Brutaltronics8 жыл бұрын
they are gonna sue!
@DanDart8 жыл бұрын
My idea too
@Brutaltronics8 жыл бұрын
they might be using apache, how can you tell before hand
@jelleverest8 жыл бұрын
People calling themselves hackers because they did a DDoS attack, is like people calling themselves lock pickers for blowing up the safe.
@egonzalez42948 жыл бұрын
Simple rule. If you can make money out of it then you are a real hacker. Otherwise you are just an aficionado.
@koohikoo8 жыл бұрын
nah, script kiddie
@cookiesnmilkfilms90567 жыл бұрын
Makes so much sense now
@martinkunev99116 жыл бұрын
What is the relevance of this comment to the video?
@sixstringedthing6 жыл бұрын
Eh, but then you've destroyed the contents of the safe, which isn't what a DDoS does. It would be more like throwing the safe off a bridge into very deep water. Or launching it into space on an extrasolar trajectory. And then proclaiming yourself to be the greatest safecracker of all time. :)
@lewisb86348 жыл бұрын
I could listen to Dr Pound explain things for hours. Such an interesting video! Thanks for the upload Computerphile :)
@GTOUranus8 жыл бұрын
Dr Pounds videos are the best by far.
@mortenmoulder8 жыл бұрын
I want Mike to explain RUDY as well! The most common DDoS attack methods would be awesome to hear more about. He explains it very nicely!
@aries_91308 жыл бұрын
My God, this guy is so freaking amazing.
@aries_91308 жыл бұрын
I don't really care for an accurate description as long as the concept behind it is described, which he did. If one were to want a more accurate description, I'm sure one could find one for themselves. I don't think that this video is meant as a walk-through to an exploit.
@Remmes8 жыл бұрын
Wow that's such a clever attack.
@duminicad8 жыл бұрын
it is, but just glance at apache's documentation and you'll find timeouts for keep alives and "read timeout"
@wmramsey268 жыл бұрын
It's rare that I get excited like a little kid anymore but when I saw a new Dr Mike Pound video in my feed I almost started jumping up and down clapping my hands lol
@Dearth1237 жыл бұрын
Always love to see the enthusiasm Dr. Pound puts in his explanations.
@Aragorn4507 жыл бұрын
I love how the amplifier was set to 11 :-)
@DaveWhoa5 жыл бұрын
Nigel respect
@anonymousyoutubeguy79404 жыл бұрын
Amplified?
@amaarquadri4 жыл бұрын
One of my favorite computerphile videos!
@diotough8 жыл бұрын
Kind of a passive aggressive DOS. Totally agree … beautifully elegant and diabolical :D
@keyb0ard6204 жыл бұрын
Every video i see from Computerphile(Mike) i am totally in love how excited he explains everything he always infect me to try it out on my next customer...
@seamusfrederick29278 жыл бұрын
Now it's my new favourite too..thanks for giving me ideas computerphile
@jpeg19918 жыл бұрын
6:34 CTRL+SHIFT+R will refesh whilst ignoring the cache.
@chairwood8 жыл бұрын
it would make things so much easier if viruses actually had the .virus extension like at 0:45
@godfreypoon51486 жыл бұрын
Hey, would you like to download my file? It is called secretbitcoinaddress.notavirus
@genericdeveloper39665 жыл бұрын
W3C is working on the standard
@scodiofficer00125 жыл бұрын
Instead of ".exe"
@anandsuralkar29475 жыл бұрын
@@godfreypoon5148 lol
@baronvonbeandip3 жыл бұрын
Virus software be like "del /S C:\*.virus"
@Pscribbled8 жыл бұрын
This guy is the best computerphile host!
@SebastianLopez-nh1rr7 жыл бұрын
People! The first D in DDoS has a meaning, and it is DISTRIBUTED. If only one computer attacks, it's just a regular DoS.
@guywiththebottle5 жыл бұрын
Mike is great in front of a camera. Good at explaining and charismatic!
@ShaharNacht6 жыл бұрын
"Mike's Website" "It's purple"
@mohammadyousef28124 жыл бұрын
i hope you guys don't stop uploading like these informative videos. they are pretty informative and well organized. keep going with these videos
@CorneliusSneedley8 жыл бұрын
Very interesting. We so often get told about what something like this does, but this is the first time I have ever seen such a thing actually demonstrated. And, nice to see a Linux box on this channel. :)
@lesterjohnpulanco25795 жыл бұрын
ive been watching/listening your vids for 2 consecutive days while im at my work. it's so informative and how you deliver your explanations is so incomparable. i love it
@SuperWerdooo5 жыл бұрын
I don’t know shit about programming but it’s always fun to see a nerd talk about their passion lmao
@Creepkido5 жыл бұрын
your profile pic is intresting lol
@blucat49 ай бұрын
I love Mike Pound's videos, especially this one. Cheers. 🙂
@toastom8 жыл бұрын
I love Mike's videos explaining how to do these attacks! I would never do them (I don't want to go to jail :) ), but they are really interesting. Keep 'em coming!
@joukevandermeijden24338 жыл бұрын
Thomas Gourley
@joepelletier66948 жыл бұрын
do you honestly think that you could go to jail for this?
@svnhddbst89688 жыл бұрын
+joe 10001001 you absolutely would go to jail for a denial of service attack like this. if i'm not mistaken, it's a federal offense.
@joepelletier66948 жыл бұрын
it depends who you do it to and how effective it is tho right?
@joepelletier66948 жыл бұрын
large companies rely on a lack of public knowledge on tech and bribery to make things like dos illegal. if you think about it dos is a form of peaceful protest (when the participants are willing). using current event as an example, ddos attacks are analogous to a crowd of people standing in front of trump tower to prevent people getting in and by extension, trump making money. this dos attack is perfectly understood by this hypothetical scenario. you fine out that a restraint has been steeling credit card numbers, so you gather a group of 30 friends who each take a table, then when a waiter comes to get their order they ask for 5 more minutes. in my opinion, you and your friends are not committing a crime, any loss in profit that the restaurant is facing is their fault because they chose not to kick you out. and with the normal ddos attack you are simply peacefully protesting (if you are using a botnet and not and not a community who agrees and wants to help the cause) you are guilty of a different crime.
@omkhard18333 жыл бұрын
best explaination ............ I am blessed to watch a Channel like computerphile, david bombal etc
@sebisuarez102 жыл бұрын
I love how excited he is about this DoS and explaining it. The explanation really helped with my studies for CEH! THanks!
@exm32666 жыл бұрын
"The same person looking at the website really slowly 200 times"
@Yaxqb7 жыл бұрын
Love these server and networking videos, keep 'em coming
@Pumbear5 жыл бұрын
It's the modern equivalent of standing behind 200 grandma's at the post office.
@AnesuC8 жыл бұрын
Yay Ubuntu, using it right now and have been for 3 years as my main OS. Used it before for like 2 or more years as a 2nd OS to play around with
@horseradish8438 жыл бұрын
Nobody cares m8
@ELYESSS8 жыл бұрын
good for you
@AnesuC8 жыл бұрын
Speedyjens I was just sharing my experience with Ubuntu cos you rarely see people use it. If you don't care, you can skip along like everyone else does. I am sure you don't care about every KZbin comment and you generally skip along. This one shows you somewhat care to make the effort to reply to....
@horseradish8438 жыл бұрын
Anesu C You comment really had nothing to do with the video. *cough* alot of servers uses ubuntuu *cough*
@AnesuC8 жыл бұрын
Speedyjens They use Linux not specifically ubuntu, tha I have experienced first hand. Also it doesn't matter if it wasn't explicitly related to the topic, it's like watching a show and your favorite actor/singer/etc shows up. You will notice a lot of comments about that person rather than the topic of the show itself.... Just another note, this video pretty much covered the topic well, I had nothing else to add, hence I mentioned this instead.
@R0craida8 жыл бұрын
Dude, I love these videos!
@sasjadevries8 жыл бұрын
You can just as well call it "the power of being lazy"
@Gersberms8 жыл бұрын
@computerphile: I love how the servers are in the cloud. You guys do great work!
@DantalionNl8 жыл бұрын
These videos are fun but I would have liked to see a part about how not to get downed by such a attack especially since a large portion of viewers possible has a website or server somewhere since most of us are working with computers every now and again.
@dustinjames12688 жыл бұрын
I agree. Not much substance to this video without preventative measures.
@user2558 жыл бұрын
Just drop the connection if it is unrealistically slow.
@DantalionNl8 жыл бұрын
user255 Sure could you give a example of how to setup a iptable rule or apache configuration that would do this for me then?
@user2558 жыл бұрын
Dantali0n I think I spoke too soon... it is not as easy as I thought. But check this: insights.sei.cmu.edu/cert/2009/07/mitigating-slowloris.html
@freegameLP8 жыл бұрын
Wow, this attac honestly is quite beautiful
@KittyBoom3608 жыл бұрын
I was giggling the whole time thinking this is my favorite too. So how is the wild dealing with this? Are servers cutting off slow connections now but the cutoff point is like where the battles are fought?
@luiss79897 жыл бұрын
This is great for testing how much HTTP requests a server can handle aside from simulating a DOS attack it can really show you how much your server can handle.
@PlasmaHH8 жыл бұрын
Err, wait, we were using that in the 90s all the time, I always thought there had been countermeasures implemented even back then...
@garryiglesias40748 жыл бұрын
You don't need a thread per socket... A thread could handle "thousands" of slow socket... This is a design problem in a "optimisation" done on the Apache server. As he said, not all http server have this weakness.
@PlasmaHH8 жыл бұрын
Hendrik-Jan Smit You might want to research the C10k problem. For one you can make connection handling much much more effective, also you can rather easily detect a client misbehaving this way and block it.
@depravedone8 жыл бұрын
As Morgan says, "Everything gets a return"
@dwietr8 жыл бұрын
You got to love those layer 7 attacks, abusing services with ...
@NeonsStyleHD8 жыл бұрын
This guy reminds me a lot of that guy that played Spiderman in the movies.
@Plan36c5 жыл бұрын
Such an elegant explanation
@SimonHuenecke5 жыл бұрын
Is it possible to combine this attack with IP Spoofing, so that the IP adr is never the same? It would look like 200 different slow people would look at this at a time.
@dneendcreeper32394 жыл бұрын
Even better than that, the packets are so small that you can easily route them through the Tor network, maybe even with a separate connection for each socket. (Depending on the per socket timeout)
@Toimi5 жыл бұрын
That is so clean and elegant.
@MD-pg1fh8 жыл бұрын
Would you say the server technology is "a patchy" one?
@bavarecmk7 жыл бұрын
I subscribed to this channel just because of how this person speaks, it's like a therapy :D
@gtcfktu8 жыл бұрын
So....What's the fix? how to prevent such an attack?
@moaqyigl8 жыл бұрын
I would think having a hard timeout on connections (as in having any single connection not be longer than a few seconds) would work, although it might make accessing the site from a very slow connection impossible.
@TurkishLoserInc8 жыл бұрын
Any server that doesn't have one thread dedicated for each socket will fair well against this attack. Nginx can handle 10k concurrent connections, probably more of these "pseudo"connections
@ELYESSS8 жыл бұрын
I don't know but maybe limit the number of connections per user or don't use apache?
@stensoft8 жыл бұрын
+Natanor That would not work. Apache already has hard timeout for requests but the script recreates each connection that was closed by the server. +ILYES You can limit the number of connections from an IP address but that may make your website unuseable from some large companies or organisations that have only a few external IP addresses.
@chainingsolid8 жыл бұрын
I would try solving it by prioritizing the faster connections and having lower time outs.
@abhishekramchandran78556 жыл бұрын
The SYN flood is a more prevelant kind of DOS. Awesome video!
@joebazooks8 жыл бұрын
beautiful
@BrunoJuncklaus8 жыл бұрын
Dr. Pound is always so good.
@AxeLea38 жыл бұрын
This is the funniest DDOS
@AxeLea38 жыл бұрын
Where you're right, you're right. Thanks for your clarification
@dzikiLOS8 жыл бұрын
I'd like to give props to both of you guys - nidefawl for giving proper explanation and Axel for taking the lesson. If only internet was full of people like you! ;)
@AxeLea38 жыл бұрын
+dzikiLOS I guess the Internet will never be full of people like the ones in this comment section -_- But that's more in a conjunction to people in general. not the web
@breadleymcthicc54446 жыл бұрын
@nidefawl I'd thought it would be, given the amount of connections, and all of them distributing a connection. I don't know, though, because I have hardly any experience with any form of coding.
@MrReese3 жыл бұрын
I love this and the fact that he also loves it and tries to hide that he loves it makes it even better :D.
@Humance8 жыл бұрын
Ubuntu, Sublime Text and Python. I like that!
@Yuzuki13376 жыл бұрын
Daniele Dal Col Aka the "I just enlisted in an IT course but Ill still call myself a real programmer already" starter package :) /s
@sarys736 жыл бұрын
Dude you get so excited when explaining these things, I find that I end up smiling from start to finish, and in the end my smile slowly fades after a minute or so. lol
@goeiecool99998 жыл бұрын
While watching this video.... I casually used my toe to start up my ubuntu web server.... No reason....
@Kali9030 Жыл бұрын
Randomly ended up here and really enjoyed the demo.
@TheActualTed4 жыл бұрын
Apache opening a new thread be like: *"Haii! I'm Mr. Meeseek, look at me!"*
@revenevan113 жыл бұрын
Lol too accurate
@cat474 жыл бұрын
This is awesome, I love this attack. I tried it out on a google site I made and it made the site really slow, but I didn’t feel like waiting for the site to go down.
@leungchinghim8 жыл бұрын
now I know how to break my website, but how can I defend it?
@recklessroges8 жыл бұрын
#firewall might fix this for you ip6tables -I INPUT -p tcp --syn --dport 443 -m connlimit --connlimit-above 10 -j DROP iptables -I INPUT -p tcp --syn --dport 443 -m connlimit --connlimit-above 10 -j DROP
@wood-eye8 жыл бұрын
Can you elaborate? I assume that drops the slow connections, right?
@unaliveeveryonenow8 жыл бұрын
I assume it limits the number of connections per IP to 10 on port 443. This might ban an entire country.
@unaliveeveryonenow8 жыл бұрын
***** Qatar has only one public IP. Everything I say is 100% serious.
@unaliveeveryonenow8 жыл бұрын
***** I don't know either. A different situation: a bunch of governments are blocking a lot of sites. If one were to use Tor to bypass it he would have found that some CDNs are blocking Tor IPs. I guess these are rare cases and generally shouldn't be worried about.
@alonsosa82728 жыл бұрын
Excellent video! One of my favorites so far.
@TwiiKuuTF28 жыл бұрын
It goes up to 11
@badgerlife95418 жыл бұрын
That was educational and so fun to watch at the same time :) thanks for making this video! Please continue to show more code/ link code in the description.
@enoua52228 жыл бұрын
I accidently did this to my own server
@mynameismichael1238 жыл бұрын
love the spinal tap reference on the amplifier
@chongjunxiang30028 жыл бұрын
Talking about DDoS, well, a lot of disappointed Americans did it to Canada Immigration Department, should it count as DDoS?
@anonymousyoutubeguy79404 жыл бұрын
So are you like the maple version of a Trump supporter. "Damn Americans, comings here too lazy to make hockey sticks like the rest of us; coming here go'n take my job at the hockey stick factory."
@IntheBleak7 жыл бұрын
That is so dastardly and elegant.
@AmxCsifier8 жыл бұрын
What's the solution?
@boothegoopc84178 жыл бұрын
Typewriters and postage stamps
@Hypernerdwithcam7 жыл бұрын
boothegoo pc No, iptables
@critico43967 жыл бұрын
Design a thread to handle all the slow connections? ---> Two lorises having fun chatting with each other...
@porsche911CarreraRSR7 жыл бұрын
That's not an automatic solution though right? You need an administrator to recognize the problem and block their IP right?
@critico43967 жыл бұрын
@Yanni mouzakis I have no idea. Even if it's possible to handle/consolidate slow connections automatically, it just make the attacker pay as much resource as the server in the end.
@johnhurley89187 жыл бұрын
I'm taking a cyber security class now. I've learned about a lot of DoS attacks and this one is the most HILARIOUS attack i've heard of so far.
@kushy35318 жыл бұрын
Am i the only one who only likes this guy? :o
@contingenceBoston8 жыл бұрын
Nope. And I'll bet I'm not the only one who is happy to a Linux box from my own Linux box.
@userou-ig1ze8 жыл бұрын
thanks so much, the info is gold and the way you present it is perfect
@modernkennnern8 жыл бұрын
0.:55, look at that amp. 11 :P
@jessemckeown56288 жыл бұрын
something like this was alluded to in Gibson's "Neuromancer"; fascinating that it sometimes works in the real world!
@hellterminator8 жыл бұрын
6:03 Dude, that's a public IP.
@willway12348 жыл бұрын
It's probably local for the University, their local IP address usually look like public ones.
@ZacharyClaretScott8 жыл бұрын
Probably public, Universities often give out public IP's to clients
@bitterlemonboy4 жыл бұрын
@@willway1234 Yes, it is.
@bluesquare235 жыл бұрын
I’m pretty sure you could configure monitoring on a web server to close connection which were slower once Apache’s max connections were reached. But I love the name of this attack!
@Tuchulu8 жыл бұрын
Where can I download that brownish windows theme?
@MikeTheFailboat8 жыл бұрын
It's actually a different operating system, a Linux distro called Ubuntu.
@red_isopat7 жыл бұрын
not windows
@DrRChandra8 жыл бұрын
sounds very similar to (or built on) the resource exhaustion attack, where you open up as many sockets as you can muster, but don't send anything. The server runs out of sockets, primarily because the OS is typically going to allocate only so many resources to maintaining sockets in general (just like in *ix there are upper bounds on number of systemwide open file descriptors, number of per-process open file descriptors, number of slots in the process table, number of shared memory segments, number of GIDs of which a process can be a member, and similar arbitrary and sometimes configurable constraints).
loved the video. also please tell Mike to retake neural nets series, I'm eager to see more
8 жыл бұрын
Nginx, need I say more?
@noredine8 жыл бұрын
yes, say more please
8 жыл бұрын
I'll say that I used Apache 2.2 and then 2.4 for a few years and I'm so happy that I switched to Nginx.
@noredine8 жыл бұрын
thanks for more :)
@pr0kris8 жыл бұрын
Or Node.js
8 жыл бұрын
Ljón That's quite different though.
@sydniusalminia53646 жыл бұрын
When I realized what a slow loris actually does at the 1:40 when the graphic came up I literally laughed out loud. Like, loud. This is hilarious and it's my favorite now too!
@TheAkashicTraveller8 жыл бұрын
Why not just go: Oh we have a few hundred stupidly slow connections; they're probably not legitimate; lets, for now, decrease the time out, any lost legitimate slow connection are just an acceptable loss. Edit: Actually you'd probably have to create a new time out that drops the connection regardless of weather it's still sending data.
@trbry.8 жыл бұрын
sounds like a solution a business owner would agree with.
@stensoft8 жыл бұрын
That is already implemented in Apache, requests have hard limit after which they are dropped. However, the script simply reopens every connection that the server closed. A few legitimate requests may skip through but that would hardly make a shop useable. The correct solution is to use a web server that does not spawn a new thread for each connection (usually as a reverse proxy that will collect and resend requests if you still need Apache for your website). Then they can easily handle tens of thousands of such connections.
@TeeDawl8 жыл бұрын
That has the problem that the attacker still just opens up new requests. Even if you drop all of the connections quicker, the attacker will also open requests quicker. So the attacker still eats up your threads.
@ericsbuds8 жыл бұрын
I wonder if there is a way that Apache servers can implement a non thread based connection scheme or something. There must be a common fix or prevention method if half of all webservers are running the most vulnerable system!
@TeeDawl8 жыл бұрын
ericsbuds "non thread based" do you even know what threads are?
@nou14386 жыл бұрын
THis is one of my favorite videos
@18tn8 жыл бұрын
my school website is going down :)
@OwenPrescott8 жыл бұрын
Jails website is going down.
@fnvtyjkusg8 жыл бұрын
enjoy school
@15Redstones8 жыл бұрын
put a link to a batch file in a public directory of the school computer system that opens a window that says "I just learned batch!" like a program made from a tutorial so if someone opens it hes just like "k, someone accidentally put this file in the public folder" but it also launches the Slow Loris program as that curious person who opens it. Nobody can see who put that file in the public folder, even if they figure out that when you are curious to open that myfirstbachfile.bat you launch a DDOS on the school site in the background.
@toastom8 жыл бұрын
15 Redstones That's genius! Sadly, I'm too scared to even try to do that, because I'm afraid of getting caught. Sometimes I like to fantasize about this kind of stuff, too, but I'd never do it.
@15Redstones8 жыл бұрын
Thomas Gourley I wouldn't do it either, because I'm actually in our IT club and working on the school homepage, so I am working on making sure that nobody can XSS or SQL-Inject it. Altough maybe I would try it on the local server where we test stuff, since it's our server it would be legal to hack it if I ask my teacher first.
@thompson94516 жыл бұрын
Right at 2:32 I realized why this is such a funny attack and could not stop laughing. Such a troll.
@realeques8 жыл бұрын
I want more from this guy ! He is the best!
@scenedude8 жыл бұрын
I love the way how they filmed it like as your at the set of the series The Office :P