top of page

Recursive HTTP GET Flood

To perpetrate this attack, a malicious actor requests an array of web pages from a server, inspects the replies, and iteratively requests every website item to exhaust the server’s resources. The exploitation looks like a series of legitimate queries and can be difficult to identify.

Read more at Woods LLP

73 views0 comments

Recent Posts

See All
bottom of page