• Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Menu
  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Dashboard
Popular Search fivem

Getting Started

  • What is Lectron?
  • FAQ
  • Locations
  • Features
  • Billings
  • Getting started
  • How to use the Dashboard
  • Why is this called Armor?
  • How to Configure SRV Record Correctly
  • How to report high ping issues to Lectron?

Beginner's Guide

  • What is the internet?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works
  • TCP vs. UDP Comparison
  • What is a server?
  • What is a DDoS attack?
  • What is a Firewall?
  • Protected: What is a port?
  • How to Configure SRV Record Correctly
  • Proxy Protocol
  • What is TCP Protocol?
  • What is UDP Protocol ?

Troubleshooting

  • High Latency and General Lag
  • Edge TLS
  • Ping and TraceRoute (tracert) commands
  • Understanding Network Address Translation (NAT)
  • What are SSL, TLS, HTTP and HTTPS?
  • Understanding IPv4 and IPv6
  • Understanding FTP (File Transfer Protocol)
  • What is Wireshark
  • Diagnosing Network Issues with MTR

Attack Types

  • SYN Flood
  • TCP Half-Open
  • DNS Reflection Attack
  • Denial of Service explained
  • DDoS through DNS Requests
  • UDP Flood
  • Vulnerability Attack
  • Phishing Attacks
  • Common Security Threats
  • Ping of Death ICMP Attack
  • Slowloris Attack

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Firewall

  • what is Firewall?
  • Home
  • Documentation
  • Protect
  • Attack Types
  • Slowloris Attack

Slowloris Attack

Slowloris Attack is a low and slow protocol attack tool that generates a denial of service attack. It generates a slow rate and low volume of traffic that it makes it difficult to be detected by standard anti – DOS mitigation systems.

This type of attack sends off a simple “get request” to a website whereas the server will respond with the specific request. This attack uses these requests subtlety without using any codes but only by creating simple conversations between servers without any termination sequence. This causes the web server to allocate limited resources to these open connections for it expects them to be short and terminated. This process is hard to detect by firewalls or anti – DOS mitigation systems for these are valid HTTP requests.

Slowloris will use this loop hole and generates thousands of requests as long as it can where none of them are terminated which consumes available open connections and denies new and legitimate users, thus creating a denial of service.

Reactions
Share this Doc:
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on June 25, 2021
Ping of Death ICMP Attack

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

join our newsletter

Get frequent news, updates and rewards !





We make the metaverse a better place.
Facebook-f Twitter Instagram Linkedin-in Youtube Github Twitch

Quick Menu

  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Menu
  • Locations
  • Pricing
  • Calculator
  • Affiliate
  • Merchandise
  • Blog
  • Documentation
Copyright © Lectron, Inc. | All rights reserved
Trademarked with United States Patent and Trademark Office