How to Install and Uninstall slowhttptest.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)
Last updated: November 17,2024
1. Install "slowhttptest.x86_64" package
This guide covers the steps necessary to install slowhttptest.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)
$
sudo dnf update
Copied
$
sudo dnf install
slowhttptest.x86_64
Copied
2. Uninstall "slowhttptest.x86_64" package
Please follow the instructions below to uninstall slowhttptest.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):
$
sudo dnf remove
slowhttptest.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the slowhttptest.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)
Last metadata expiration check: 0:06:15 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : slowhttptest
Version : 1.8.2
Release : 1.el8
Architecture : x86_64
Size : 49 k
Source : slowhttptest-1.8.2-1.el8.src.rpm
Repository : epel
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.
Available Packages
Name : slowhttptest
Version : 1.8.2
Release : 1.el8
Architecture : x86_64
Size : 49 k
Source : slowhttptest-1.8.2-1.el8.src.rpm
Repository : epel
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.