My friend Jeff from { ParsedContent } and I were discussing the techniques one could use to surreptitiously download files from and FTP server using Python. Jeff has made a posting on Dream.In.Code looking for some quick guidance, and I jumped at the chance to flex my programming muscles.
PyLoris 3.0 is a complete rewrite of the PyLoris code base. Everything was rethought, restructured, and rebuilt from the ground up. Along the way, I developed a feature set that I felt it needed, while retrospectively analyzing how PyLoris' users were trying to use it. In the end PyLoris 3.0 was given a GUI, a Scripting interface, and a threaded API.
PyLoris is a tool that can be used to test web servers for a vulnerability to a specific class of Denial of Service attack. This class of attack is described by RSnake--along with the original proof of concept--at http://ha.ckers.org/slowloris.
PyLoris is a scriptable tool for testing a service's level of vulnerability to a particular class of Denial of Service (DoS) attack. Any service that places restrictions on the total number of simultaneous TCP connections has the potential for vulnerability to PyLoris. Additionally, services that handle connections in independent threads, services that poorly manage concurrent connections, and services that have high memory footprint per connection are prone to this form of vulnerability.