Search

Recursive HTTP GET Flood


To perpetrate this attack, a malicious actor requests an array of web pages from a server, inspects the replies, and iteratively requests every website item to exhaust the server’s resources. The exploitation looks like a series of legitimate queries and can be difficult to identify.


Read more at Woods LLP

28 views0 comments

Recent Posts

See All