Telco Transformation: enable you to deploy and offer DDoS mitigation-as-a-service at a low capex and a low opex.
Read more
MX7000: A powerful, versatile 'cloud-in-a-box' DDoS mitigation solution.
Learn more
TAP the lucrative market for DDoS Protection.
Be Our Partner
The Capture The Flag challenge: Get on the top of the scoreboard and win an Pentester Expert Coin !
Enroll now
The total number of DDoS attacks fell 13% in 2021 over 2020, but were still well above pre-pandemic levels, according to our recently released DDoS Statistical Report for 2021. Learn More
Cybersecurity best practices and DDoS defence strategies
In our last blog post, we analyzed the attack tools used to launch DDoS attacks in Hong Kong. Today, I’d like to examine Torshammer – a slow-rate DDoS attack tool – that has been used frequently by hacktivists.
Tor’s Hammer is a slow-rate DDoS attack tool that is efficient and very disruptive on most apache servers.
Similar to regular volumetric DDoS attacks, slow-rate DDoS attacks exhaust web server resources by generating a large amount of connections for as long as possible. More technically, it uses the classic form of slow POST attack, generating HTTP POST requests and connections that will hold for around 1000-30000 seconds.
Instead of leveraging huge attack bandwidth or large amounts of HTTP requests per second, slow-rate DDoS attacks simply exploit the maximum current connection time apache servers can handle.
Stay tuned as we collect more information on Tor’s Hammer and its attack history in Hong Kong. For a more in-depth analysis on this slow-rate DDoS attack tool and its impact on servers, please visit my personal blog post.
Thank You!
We will get back to you shortly.
Similar to regular volumetric DDoS attacks, slow-rate DDoS attacks exhaust web server resources by generating a large amount of connections for as long as possible.
© 2022 Nexusguard - All Rights Reserved. Read Our Privacy Policy.