[Owasp-Malaysia] HTTP Post DOS Attack
rastaboyz at gmail.com
Tue Nov 9 02:05:40 EST 2010
This is cool, can anyone tell how do we protect it? Is there any way than
changing the existing web server?
On Thu, Nov 4, 2010 at 9:15 PM, Yusof Khalid - FreeBSD / OpenBSD <
fryshadow at gmail.com> wrote:
> please don't used it to me :P
> On Thu, Nov 4, 2010 at 4:37 PM, Mohd Fazli Azran <mfazliazran at gmail.com>wrote:
>> Dear members,
>> Onn Chee from OWASP Singapore already present with us about this kind of
>> technique in our 2nd meetup OWASP Malaysia. He will present again at OWASP
>> AppSecDC2010 about same topic with Tom Brennan. It a very interesting topic
>> and also will have as shock like lighting if any people know about this.
>> Until now i keep his presentation cause it have many sensitive information
>> that we cant expose to outside.
>> I believe after his presentation at AppSecDC i will sent to you the
>> presentation about HTTP Post DOS attack<http://www.darkreading.com/vulnerability_management/security/attacks/showArticle.jhtml?articleID=228000532>to public. You can read it little bit what HTTP Post Attack but for who come
>> on the 2nd meetup they get many sensitive information from it. I know some
>> of them already use it. huhuhuh (bad laugh).
>> Mohd Fazli Azran
>> Owasp-Malaysia mailing list
>> Owasp-Malaysia at lists.owasp.org
>> OWASP Malaysia Wiki
>> OWASP Malaysia Wiki Facebook
> Owasp-Malaysia mailing list
> Owasp-Malaysia at lists.owasp.org
> OWASP Malaysia Wiki
> OWASP Malaysia Wiki Facebook
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Owasp-Malaysia