How to Install and Uninstall slowhttptest Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: November 25,2024
1. Install "slowhttptest" package
Please follow the guidance below to install slowhttptest on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
slowhttptest
Copied
2. Uninstall "slowhttptest" package
This guide covers the steps necessary to uninstall slowhttptest on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
slowhttptest
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the slowhttptest package on Ubuntu 20.10 (Groovy Gorilla)
Package: slowhttptest
Architecture: amd64
Version: 1.7-1build2
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Neutron Soutmun
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 90
Depends: libc6 (>= 2.14), libgcc-s1 (>= 3.0), libssl1.1 (>= 1.1.0), libstdc++6 (>= 5.2)
Filename: pool/universe/s/slowhttptest/slowhttptest_1.7-1build2_amd64.deb
Size: 30320
MD5sum: e7c84a028ba29093f2b0240e8461ff6a
SHA1: 9432282dc61e78fe7c612f3deec0c1e7f81c04a1
SHA256: 71b0d36529b18863f4aa4537b5429f7419a1e22f25db88cdb849000d4a3fb9ff
SHA512: a101751eecce193c40d35994c0201a3c717ae23a1c1099de7f6c6f1ceb09a79eb1947091f15100e36e81649e8794a9914091db157a9207c9cf1b2d22c3e6e27b
Homepage: https://github.com/shekyan/slowhttptest
Description-en: application layer Denial of Service attacks simulation tool
SlowHTTPTest is a highly configurable tool that simulates some application
layer Denial of Service attacks.
.
It implements most common low-bandwidth application layer Denial of Service
attacks, such as
* Slowloris
* Slow HTTP POST
* Slow Read attack (based on TCP persist timer exploit) by draining
concurrent connections pool
* Apache Range Header attack by causing very significant memory and CPU
usage on the server.
Description-md5: 0d10df6e0df816795ee57bc1debee1c2
Architecture: amd64
Version: 1.7-1build2
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Neutron Soutmun
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 90
Depends: libc6 (>= 2.14), libgcc-s1 (>= 3.0), libssl1.1 (>= 1.1.0), libstdc++6 (>= 5.2)
Filename: pool/universe/s/slowhttptest/slowhttptest_1.7-1build2_amd64.deb
Size: 30320
MD5sum: e7c84a028ba29093f2b0240e8461ff6a
SHA1: 9432282dc61e78fe7c612f3deec0c1e7f81c04a1
SHA256: 71b0d36529b18863f4aa4537b5429f7419a1e22f25db88cdb849000d4a3fb9ff
SHA512: a101751eecce193c40d35994c0201a3c717ae23a1c1099de7f6c6f1ceb09a79eb1947091f15100e36e81649e8794a9914091db157a9207c9cf1b2d22c3e6e27b
Homepage: https://github.com/shekyan/slowhttptest
Description-en: application layer Denial of Service attacks simulation tool
SlowHTTPTest is a highly configurable tool that simulates some application
layer Denial of Service attacks.
.
It implements most common low-bandwidth application layer Denial of Service
attacks, such as
* Slowloris
* Slow HTTP POST
* Slow Read attack (based on TCP persist timer exploit) by draining
concurrent connections pool
* Apache Range Header attack by causing very significant memory and CPU
usage on the server.
Description-md5: 0d10df6e0df816795ee57bc1debee1c2