Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Comsumption Attack

Posted on 2011-09-23
3
279 Views
Last Modified: 2012-05-12
Hi

Q: if my site hosted on free web hosting with limited bandwidth 30,000 MB every month? is my site vulnerable to bandwidth consumption attack? if that possible ? how is it happened?

thanks
0
Comment
Question by:ang3lus
  • 2
3 Comments
 
LVL 8

Accepted Solution

by:
pilson66 earned 125 total points
ID: 36586139
For example, I'll write a primitive script that will loop i download the same large file, until all the traffic limit

whie true; do wget -c http://tour_site.com/big.file.avi; done
0
 
LVL 8

Expert Comment

by:pilson66
ID: 36586147
If you run several of these scripts in parallel - the traffic will end several times faster.
0
 

Author Closing Comment

by:ang3lus
ID: 36586356
i got the point

thanks
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Nessus scan 5 138
Apache / XAMPP  authorisation 10 62
linux apache localhost dev laptop 5 52
Web site: http forwards to https causing 301 errors - SEO issue? 26 35
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question