Главная
Study mode:
on
1
Introduction
2
Who are we
3
Agenda
4
Why do we do this
5
Taxonomy
6
Exotic Authority
7
Proposed Method
8
Formal Method
9
Linux
10
Example
11
Graph
12
symmetric nature
13
attack
14
testing
15
other tools
16
what do we do
17
load balancers
18
a proxy
19
protection services
20
baseline
21
security
22
maximum connections
23
mod2s
24
settingstart
25
Resource Consumption
26
Motivation
27
Evasion
28
Honeypot
29
Recommended Usage
30
Bad Times Many
31
Whats Next
32
Tools
33
Paper summation
34
CPU hogs
35
Conclusion
Description:
Explore a comprehensive conference talk on identifying web application performance bottlenecks and potential security vulnerabilities through HTTP request analysis. Learn about the HTTP Time Bandit tool, designed to pinpoint resource-consuming pages in web applications by submitting a series of regular requests and analyzing the gathered data. Discover how this information can be used for both performance optimization and potential DOS/DDOS attacks. Gain insights into the tool's testing and attacking capabilities through live demonstrations on various targets. Delve into topics such as exotic authority, formal methods, Linux examples, graph symmetry, load balancers, proxy servers, protection services, baseline security, and resource consumption. Understand the motivations behind this approach, evasion techniques, and recommended usage scenarios. Examine the implications for CPU-intensive processes and explore potential future developments in this field.

HTTP Time Bandit - Identifying Web Application Performance Bottlenecks

OWASP Foundation
Add to list
0:00 / 0:00