Denial of Service
Last updated
Last updated
After input "xxxxxxxxxxxxxx" as a value of param1, check your cookies. If there is cookies the value is "xxxxxxxxxxxxxxxxxxxxxx" it means the website is vulnerable
Try input a very long payload to form. For example using very long password or using very long email
Using image with a huge pixels
Download the payload:
Frame flood, using GIF with a huge frame
Download the payload:
Sometimes in website we found a parameter that can adjust the size of the image, for example
Try change "500" to "99999999999"
A Regular Expression Denial of Service (ReDoS) happens when someone takes advantage of weaknesses in how regular expressions (a way to search and match patterns in text) work. Sometimes, when regular expressions are used, they can become very slow, especially if the piece of text they're working with gets larger. This slowness can get so bad that it grows really fast with even small increases in the text size. Attackers can use this problem to make a program that uses regular expressions stop working properly for a long time.
CPDoS
A malicious client sends an HTTP GET request including a header larger than the size supported by the origin server but smaller than the size supported by the cache
The response is
this attack tries to bypass a cache with a request header containing a harmful meta character. Meta characters can be, e.g., control characters such as line break/carriage return (\n), line feed (\r) or bell (\a).
The response is
There are several headers present in HTTP Standard that allow modifying overriding the original HTTP header. Some of these headers are:
The header instructs the application to override the HTTP method in request.
The response is
X-Forwarded-Port
X-Forwarded-Host
!