Which flood attack pretends to be navigating pages by issuing new GET requests from a valid page range?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which flood attack pretends to be navigating pages by issuing new GET requests from a valid page range?

Explanation:
This item tests recognizing an HTTP flood that mimics a user navigating a site by fetching pages within a defined sequence. In a Recursive HTTP GET Flood Attack, the attacker starts from a valid page and issues new GET requests by following links within a specified page range, doing so repeatedly to replicate a browsing session. This creates a flood of legitimate-looking page requests, quickly consuming server resources as the script crawls through the range. It’s different from Slowloris, which ties up connections by opening them and holding them open rather than generating a high rate of GET requests, and from a general multi-vector DDoS, which is not a single, specific method. The key idea here is the recursive traversal of pages within a valid range to drive up HTTP traffic.

This item tests recognizing an HTTP flood that mimics a user navigating a site by fetching pages within a defined sequence. In a Recursive HTTP GET Flood Attack, the attacker starts from a valid page and issues new GET requests by following links within a specified page range, doing so repeatedly to replicate a browsing session. This creates a flood of legitimate-looking page requests, quickly consuming server resources as the script crawls through the range. It’s different from Slowloris, which ties up connections by opening them and holding them open rather than generating a high rate of GET requests, and from a general multi-vector DDoS, which is not a single, specific method. The key idea here is the recursive traversal of pages within a valid range to drive up HTTP traffic.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy