R-U-Dead-Yet (original) (raw)
R-U-Dead-Yet (R.U.D.Y.) ist ein von Hackern genutztes Denial of Service (DoS)-Tool, um Angriffe mittels langer und langsamer POST-Anfragen auf einen Zielserver durchzuführen. Aus der Benutzerperspektive ist RUDY ein sehr benutzerfreundliches Tool mit einem interaktiven Konsolenmenü.
Property | Value |
---|---|
dbo:abstract | R-U-Dead-Yet (R.U.D.Y.) ist ein von Hackern genutztes Denial of Service (DoS)-Tool, um Angriffe mittels langer und langsamer POST-Anfragen auf einen Zielserver durchzuführen. Aus der Benutzerperspektive ist RUDY ein sehr benutzerfreundliches Tool mit einem interaktiven Konsolenmenü. (de) R.U.D.Y., short for R U Dead yet, is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks by directing long form fields to the targeted server. It is known to have an interactive console, thus making it a user-friendly tool. It opens fewer connections to the website being targeted for a long period and keeps the sessions open as long as it is feasible. The amount of open sessions overtires the server or website making it unavailable for the authentic visitors. The data is sent in small packs at an incredibly slow rate; normally there is a gap of ten seconds between each byte but these intervals are not definite and may vary to avert detection. The victim servers of these types of attacks may face issues such as not being able to access a particular website, disrupt their connection, drastically slow network performance, etc. Hackers can use such attacks for different purposes while targeting different servers or hosts; these purposes include, but are not limited to, blackmail, vengeance or sometimes even activism. The RUDY attack opens concurrent POST HTTP connections to the HTTP server and delays sending the body of the POST request to the point that the server resources are saturated. This attack sends numerous small packets at a very slow rate to keep the connection open and the server busy. This low-and slow attack behavior makes it relatively difficult to detect, compared to flooding DoS attacks that raise the traffic volume abnormally. (en) R-U-Dead-Yet,简写为R.U.D.Y.,是黑客用来执行慢速率拒绝服务(DoS)攻击的工具。它通过将长表单字段定向到目标服务器来进行“低速和慢速”的攻击。众所周知,它有一个交互式控制台,因此它是一个用户友好的工具。它减少了与目标网站的长期连接,并在可行的情况下保持会话的开放。开放会话的数量使服务器或网站超负荷,使真正的访问者无法访问它。数据用令人难以置信的慢速度以小包发送;通常每个字节之间有10秒的间隔,但这些间隔不是确定的,可能会有所不同,以避免检测。 这类攻击的受害者服务器可能会面临无法访问特定网站、连接中断、网络性能急剧下降等问题。 黑客可以针对不同的服务器或主机进行不同目的的攻击;这些目的包括但不限于勒索、报复,有时甚至是行动主义。 RUDY攻击打开到HTTP服务器的并发POST连接,并延迟将POST请求的主体发送到服务器资源已饱和的位置。这种攻击以非常慢的速度发送大量的小数据包,以保持连接打开和服务器繁忙。与泛滥的DoS攻击相比,这种低速度的攻击行为使得检测变得相对困难,因为DoS攻击会异常地增加流量。 (zh) |
dbo:wikiPageExternalLink | https://sourceforge.net/projects/r-u-dead-yet/ https://code.google.com/archive/p/r-u-dead-yet/ |
dbo:wikiPageID | 52638014 (xsd:integer) |
dbo:wikiPageLength | 2873 (xsd:nonNegativeInteger) |
dbo:wikiPageRevisionID | 926011322 (xsd:integer) |
dbo:wikiPageWikiLink | dbr:Denial-of-service_attack dbr:LAND dbr:Zemra dbr:Web_server dbr:Fork_bomb dbr:POST_(HTTP) dbr:HTTP dbr:High_Orbit_Ion_Cannon dbr:Blackmail dbr:Ping_of_death dbr:ReDoS dbc:Denial-of-service_attacks dbr:Server_(computing) dbr:Slowloris_(computer_security) |
dbp:wikiPageUsesTemplate | dbt:Orphan dbt:Reflist |
dct:subject | dbc:Denial-of-service_attacks |
rdfs:comment | R-U-Dead-Yet (R.U.D.Y.) ist ein von Hackern genutztes Denial of Service (DoS)-Tool, um Angriffe mittels langer und langsamer POST-Anfragen auf einen Zielserver durchzuführen. Aus der Benutzerperspektive ist RUDY ein sehr benutzerfreundliches Tool mit einem interaktiven Konsolenmenü. (de) R-U-Dead-Yet,简写为R.U.D.Y.,是黑客用来执行慢速率拒绝服务(DoS)攻击的工具。它通过将长表单字段定向到目标服务器来进行“低速和慢速”的攻击。众所周知,它有一个交互式控制台,因此它是一个用户友好的工具。它减少了与目标网站的长期连接,并在可行的情况下保持会话的开放。开放会话的数量使服务器或网站超负荷,使真正的访问者无法访问它。数据用令人难以置信的慢速度以小包发送;通常每个字节之间有10秒的间隔,但这些间隔不是确定的,可能会有所不同,以避免检测。 这类攻击的受害者服务器可能会面临无法访问特定网站、连接中断、网络性能急剧下降等问题。 黑客可以针对不同的服务器或主机进行不同目的的攻击;这些目的包括但不限于勒索、报复,有时甚至是行动主义。 RUDY攻击打开到HTTP服务器的并发POST连接,并延迟将POST请求的主体发送到服务器资源已饱和的位置。这种攻击以非常慢的速度发送大量的小数据包,以保持连接打开和服务器繁忙。与泛滥的DoS攻击相比,这种低速度的攻击行为使得检测变得相对困难,因为DoS攻击会异常地增加流量。 (zh) R.U.D.Y., short for R U Dead yet, is an acronym used to describe a Denial of Service (DoS) tool used by hackers to perform slow-rate a.k.a. “Low and slow” attacks by directing long form fields to the targeted server. It is known to have an interactive console, thus making it a user-friendly tool. It opens fewer connections to the website being targeted for a long period and keeps the sessions open as long as it is feasible. The amount of open sessions overtires the server or website making it unavailable for the authentic visitors. The data is sent in small packs at an incredibly slow rate; normally there is a gap of ten seconds between each byte but these intervals are not definite and may vary to avert detection. (en) |
rdfs:label | R-U-Dead-Yet (de) R-U-Dead-Yet (en) R-U-Dead-Yet (zh) |
owl:sameAs | yago-res:R-U-Dead-Yet wikidata:R-U-Dead-Yet dbpedia-de:R-U-Dead-Yet dbpedia-zh:R-U-Dead-Yet https://global.dbpedia.org/id/2cowR |
prov:wasDerivedFrom | wikipedia-en:R-U-Dead-Yet?oldid=926011322&ns=0 |
foaf:isPrimaryTopicOf | wikipedia-en:R-U-Dead-Yet |
is dbo:wikiPageRedirects of | dbr:R_U_Dead_yet dbr:R.U.D.Y. |
is dbo:wikiPageWikiLink of | dbr:Slowloris_(computer_security) dbr:R_U_Dead_yet dbr:R.U.D.Y. |
is foaf:primaryTopic of | wikipedia-en:R-U-Dead-Yet |