How to Install and Uninstall slowhttptest.x86_64 Package on Fedora 36
Last updated: January 16,2025
1. Install "slowhttptest.x86_64" package
This tutorial shows how to install slowhttptest.x86_64 on Fedora 36
$
sudo dnf update
Copied
$
sudo dnf install
slowhttptest.x86_64
Copied
2. Uninstall "slowhttptest.x86_64" package
This tutorial shows how to uninstall slowhttptest.x86_64 on Fedora 36:
$
sudo dnf remove
slowhttptest.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the slowhttptest.x86_64 package on Fedora 36
Last metadata expiration check: 0:05:37 ago on Thu Sep 8 08:04:50 2022.
Available Packages
Name : slowhttptest
Version : 1.9.0
Release : 1.fc36
Architecture : x86_64
Size : 42 k
Source : slowhttptest-1.9.0-1.fc36.src.rpm
Repository : updates
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.
Available Packages
Name : slowhttptest
Version : 1.9.0
Release : 1.fc36
Architecture : x86_64
Size : 42 k
Source : slowhttptest-1.9.0-1.fc36.src.rpm
Repository : updates
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.