Dec 14th, 2012 DISCLAIMER: Do not use any of the material presented here to cause harm. I will find out where you live, I will surprise you in your sleep and I will tickle you so hard that you will promise to behave until the end of your days. The story so far One of the most impressing demonstrations of the attack was sending crafted data to a web application. The web application would dutifully parse that data into a hash table, not knowing that the data was carefully chosen in a way so that each key being sent would cause a collision in the hash table.
Read full article from Breaking Murmur: Hash-flooding DoS reloaded - Martin Boßlet
No comments:
Post a Comment