How to Install and Uninstall slowhttptest.x86_64 Package on Fedora 34
Last updated: October 05,2024
1. Install "slowhttptest.x86_64" package
This is a short guide on how to install slowhttptest.x86_64 on Fedora 34
$
sudo dnf update
Copied
$
sudo dnf install
slowhttptest.x86_64
Copied
2. Uninstall "slowhttptest.x86_64" package
Please follow the steps below to uninstall slowhttptest.x86_64 on Fedora 34:
$
sudo dnf remove
slowhttptest.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the slowhttptest.x86_64 package on Fedora 34
Last metadata expiration check: 3:45:59 ago on Tue Sep 6 02:10:55 2022.
Available Packages
Name : slowhttptest
Version : 1.8.2
Release : 2.fc34
Architecture : x86_64
Size : 43 k
Source : slowhttptest-1.8.2-2.fc34.src.rpm
Repository : fedora
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.
Available Packages
Name : slowhttptest
Version : 1.8.2
Release : 2.fc34
Architecture : x86_64
Size : 43 k
Source : slowhttptest-1.8.2-2.fc34.src.rpm
Repository : fedora
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.