Skip to content

sebastienwebdev/Vulnerability

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Apache HTTP Server

Description

This project showcases a Python script aimed at understanding and exploiting a Denial of Service (DoS) vulnerability, specifically CVE-2023–43622, found in Apache HTTP Server versions prior to 2.4.58. The vulnerability involves manipulating the initial window size in HTTP/2 connections, potentially causing server resource exhaustion. The script utilizes socket for TCP connections, threading for concurrent attacks, and h2.connection for HTTP/2 protocol handling, demonstrating how to establish a TCP connection, initialize an HTTP/2 connection, manipulate window size, and send requests to flood the server with difficult-to-process connections.

Designed for educational purposes and conducted in a controlled environment, this demonstration highlights the importance of upgrading to Apache version 2.4.58 or later to mitigate the vulnerability. By exploring this exploit, cybersecurity enthusiasts can gain practical insights into the mechanisms of DoS attacks and the significance of continuous server maintenance and vulnerability assessment in enhancing cybersecurity defenses.

Languages and Utilities Used

  • Python
  • Pulsar (Text Editor)
  • Nessus Vulnerability Scanner

Environments Used

  • MacOS

Program walk-through:

Launch Nessus:
Disk Sanitization Steps

Select the Vulnerability:
Disk Sanitization Steps

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages