CDN 2021 full attack Guide (2)

  • CDN 2021 full attack Guide (1)This article mainly introduces the current basic strategies for CDN detection and bypass methods. After reading many high-latitude papers from Tsinghua University, this article mainly starts from protocol layer control, I will tell you what kind of Sparks will happen when standard and non-standard collisions are linked to CDN attacks under different protocol specifications?
    HTTP range amplification attack
    Range amplification attacks, also known as Rangeamp, are implemented by using the specifications and features of Range request headers in the HTTP protocol. For target websites, we can send a HEAD request, to determine whether Range request headers are supported:

    If the destination website supports Range transmission, the system returnsAccept-Ranges: bytes
    Of course, we can also directly addRange: bytes=The request header sends the data packet, and then checks whether it returns the byte data of the specified request. Pay attention to the response status. The returned data is 206 Partial Content.

    SBR small byte range attacks
    SBR small-byte Range attacks mainly use the asymmetric method between request and response traffic to amplify attacks. The client sends small-byte Range requests (for example, 1-byte), most CDN may delete the Range header or enlarge the size Range of the request bytes to optimize the cache, reduce latency, and reduce back-to-origin requests, then, the processed HTTP request is sent to the backend server.

    In this way, the response traffic is severely skewed between the source request and the processed request, that is, asymmetric. The ratio is the multiple of the attack amplification. For resources of the size of 1024KB, the magnification is basically more than 1000 times.
    The following table shows the traffic magnification when the target resource size is 1MB, 10MB, and 25MB:

    OBR overlapping byte range attacks
    OBR uses multi-Range requests, as shown in the following figure:

    SimilarRange: bytes=0-1,1-10,200-2000In normal cases, the server returns the response stream after segmentation.

    At this point, the client requests a resource, but after the server processes the overlapping range request, it returns the data traffic of N * the size of the resource, and the word request pressure is N times that of the previous one, because the server requires a large number of operations and string processing, the more overlapping requests, the greater the pressure, the more memory consumption.
    However, most websites follow RFC7233 standard to process and correct overlapping range requests.

    As shown in the figure, when we initiate a request for multiple overlapping ranges, the maximum data returned is the maximum number of bytes of our single resource, which cannot be consumed or enlarged indefinitely.
    However, some CDN nodes do not comply with the standard. In this case, you can perform cascade amplification attacks on two CDN nodes to attack Cross-CDN nodes.

    The client sends an OBR request to the front-end CDN. The front-end CDN node is directly sent to the back-end CDN node without processing. The back-end CDN node and the origin site, that is, the interaction request with the server is limited by the RFC standard of the server. In this case, the server returns the maximum response data for a single resource request.
    After the backend CDN receives a single resource data, the response resource data is multiplied N times and then transmitted to the front-end CDN node because it does not comply with the RFC standard. The larger the OBR overlap range, the higher the request pressure, the more DDOS attacks will be caused.
    The following table shows the actual traffic magnification of cascading CDN:

     
    HPACK attacks based on protocol conversion
    Inhttp/1.xIn the version of, the request Header field is not compressed, the Header field is transmitted as a string, in high concurrency scenarios, each request carries the Header field, wasting bandwidth, increased network latency.
    To solve this problem,http/2.xThe version of the pair Header information compression coding, to improve bandwidth utilization, this compression coding algorithm is hapck. HPACK is a new type of compressor that eliminates redundant header fields, limits known security attacks, and uses limited memory requirements in restricted environments.
    InRFC7541In the standard, you can see HPACK

    HPACK considers the Header field of an HTTP requestname-valueUse two index tables (static index table and dynamic index table) to map headers to index values, and use Huffman encoding for headers that do not exist, and dynamically cache it to the index to compress the header.
    The content of the header includesHeader NameAndHeader ValueTwo parts, different types contain different content.
    As the name implies, a static table is predefined. There are 61 pairs of index values in total. The table is as follows:


    Dynamic tables are expanded by the client in each HTTP request.

    k can be increased, each time a new index is inserted into the dynamic table, the new insertedkey-valueThe index subscript is s +1, and other data subscripts in the dynamic table are moved back in sequence.
    In general, HPACK's compression and coding features, combined with inconsistent protocols before and after CDN, will cause new attacks.
    Protocol asymmetric amplification attacks on static tables
    For source HTTP requests:
    Plain Text
     
    Copy code
    GET / HTTP/1.1
    Host: binmake.com
    Scheme: https
    The process of static table encoding and compression is as follows:

    As you can see, after compression, it is directly compressed from the original 52 bytes to 16 bytes:
    Plain Text
     
    Copy code
    82 84 87 41 0B 62 69 6e 6d 61 6b 65 2e 63 6f 6d
    In kali, we can use the h2load provided by nghttp2 to test the compression efficiency.

    Basically all CDNs support the HTTP2 protocol, but not all backend servers support it.
    Therefore, the asymmetric difference caused by the inconsistency of the HTTP protocol between the front and back ends can be used to amplify the traffic and create denial of service attacks:

    The magnification is about 3.3.
    Protocol asymmetric amplification attacks on dynamic tables
    For source HTTP requests:
    Plain Text
     
    Copy code
    GET / HTTP/1.1
    Host: binmake.com
    Scheme: https
    Extension: ......(1000 bytes)
    The error message returned because the request header contains moreExtensionFields and 1000-byte values cannot be found in the predefined static table. HPACK uses the extended dynamic table to record the fields:

    Note that only the first request requires uncompressed encoded extended fields to be sent to CDN. CDN adds a record to the dynamic table for the entire extended field under the HPACK mechanism.
    When the same resource is requested again, CDN checks whether the matching dynamic table matches the following conditions:


    The following table lists the CDN requests:

    At this time, the amplification coefficient is about 62 times, far exceeding the static table.
    Asymmetric amplification attacks using Huffman encoding
    According to the tree structure in the data structure, an optimal binary tree is constructed with the support of Huffman algorithm. We name this kind of tree Huffman tree. Huffman encoding is a encoding form based on Huffman trees, which is generally used for compression and decompression.
    HPACK supports Huffman encoding for string processing, as shown in the following table:
    Plain Text
     
    Copy code
    Code
    code as bits as hex len
    sym aligned to MSB aligned in
    to LSB bits
    (0) | 11111111 | 11000 1ff8 [13]
    (1) | 11111111 | 11111111 | 1011000 7fffd8 [23]
    (2) | 11111111 | 11111111 | 11111110 | 0010 fffffe2 [28]
    (3) | 11111111 | 11111111 | 11111110 | 0011 ffffhale [28]
    (4) | 11111111 | 11111111 | 11111110 | 0100 fffffe4 [28]
    (5) | 11111111 | 11111111 | 11111110 | 0101 fffffe5 [28]
    (6) | 11111111 | 11111111 | 11111110 | 0110 fffffe6 [28]
    (7) | 11111111 | 11111111 | 11111110 | 0111 fffffe7 [28]
    (8) | 11111111 | 11111111 | 11111110 | 1000 fffffe8 [28]
    (9) |11111111|11111111|11101010 ffffea [24]
    (10) | 11111111 | 11111111 | 11111111 | 111100 3ffffffc [30]
    (11) | 11111111 | 11111111 | 11111110 | 1001 fffffe9 [28]
    (12) |11111111|11111111|11111110|1010 fffffea [28]
    (13) | 11111111 | 11111111 | 11111111 | 111101 3ffffffd [30]
    Peon & Ruellan Standards Track [Page 27]
    RFC 7541 HPACK May 2015
    (14) |11111111|11111111|11111110|1011 fffffeb [28]
    (15) |11111111|11111111|11111110|1100 fffffec [28]
    (16) |11111111|11111111|11111110|1101 fffffed [28]
    (17) |11111111|11111111|11111110|1110 fffffee [28]
    (18) |11111111|11111111|11111110|1111 fffffef [28]
    (19) | 11111111 | 11111111 | 11111111 | 0000 ffffff0 [28]
    (20) | 11111111 | 11111111 | 11111111 | 0001 ffffff1 [28]
    (21) | 11111111 | 11111111 | 11111111 | 0010 ffffff2 [28]
    (22) | 11111111 | 11111111 | 11111111 | 111110 3ffffffe [30]
    (23) | 11111111 | 11111111 | 11111111 | 0011 ffffff3 [28]
    (24) | 11111111 | 11111111 | 11111111 | 0100 ffffff4 [28]
    (25) | 11111111 | 11111111 | 11111111 | 0101 ffffff5 [28]
    (26) | 11111111 | 11111111 | 11111111 | 0110 ffffff6 [28]
    (27) | 11111111 | 11111111 | 11111111 | 0111 ffffff7 [28]
    (28) | 11111111 | 11111111 | 11111111 | 1000 ffffff8 [28]
    (29) | 11111111 | 11111111 | 11111111 | 1001 ffffff9 [28]
    (30) |11111111|11111111|11111111|1010 ffffffa [28]
    (31) |11111111|11111111|11111111|1011 ffffffb [28]
    '(010100) | 14 [ 6]
    '! ' ( 33) | 11111110 | 00 3f8 [10]
    "' ( 34) | 11111110 | 01 3f9 [10]
    '#' ( 35) |11111111|1010 ffa [12]
    '$' ( 36) | 11111111 | 11001 1ff9 [13]
    '%' ( 37) | 010101 15 [ 6]
    '&' ( 38) | 11111000 f8 [ 8]
    ''' ( 39) | 11111111 | 010 7fa [11]
    '(' ( 40) | 11111110 | 10 3fa [10]
    ')' ( 41) | 11111110 | 11 3fb [10]
    '*' ( 42) | 11111001 f9 [ 8]
    '+' ( 43) | 11111111 | 011 7fb [11]
    ',' ( 44) |11111010 fa [ 8]
    '-' ( 45) | 010110 16 [ 6]
    '.' ( 46) | 010111 17 [ 6]
    '/' ( 47) | 011000 18 [ 6]
    '0' ( 48) | 00000 0 [ 5]
    '1' ( 49) | 00001 1 [ 5]
    '2' ( 50) | 00010 2 [ 5]
    '3' ( 51) | 011001 19 [ 6]
    '4' ( 52) | 011010 1a [ 6]
    '5' ( 53) | 011011 1b [ 6]
    '6' ( 54) | 011100 1c [ 6]
    '7' ( 55) | 011101 1d [ 6]
    '8' ( 56) | 011110 1e [ 6]
    '9' ( 57) | 011111 1f [ 6]
    ':' ( 58) | 1011100 5c [ 7]
    ';' ( 59) |11111011 fb [ 8]
    '<' ( 60) | 11111111 | 1111100 7ffc [15]
    '=' ( 61) | 100000 20 [ 6]
    Peon & Ruellan Standards Track [Page 28]
    RFC 7541 HPACK May 2015
    '>' ( 62) |11111111|1011 ffb [12]
    '? ' ( 63) | 11111111 | 00 3fc [10]
    '@' ( 64) | 11111111 | 11010 1ffa [13]
    'A' ( 65) | 100001 21 [ 6]
    'B' ( 66) | 1011101 5d [ 7]
    'C' ( 67) | 1011110 5e [ 7]
    'D' ( 68) | 1011111 5f [ 7]
    '**(69) | 1100000 60 [ 7]
    'F' ( 70) | 1100001 61 [ 7]
    'G' ( 71) | 1100010 62 [ 7]
    'H' ( 72) | 1100011 63 [ 7]
    'E' (73) | 1100100 64 [ 7]
    'J' ( 74) | 1100101 65 [ 7]
    'K' ( 75) | 1100110 66 [ 7]
    'L' ( 76) | 1100111 67 [ 7]
    'M' ( 77) | 1101000 68 [ 7]
    '**(78) | 1101001 69 [ 7]
    'O' ( 79) | 1101010 6a [ 7]
    'P' ( 80) | 1101011 6b [ 7]
    'Q' ( 81) | 1101100 6c [ 7]
    'R' ( 82) | 1101101 6d [ 7]
    'S' ( 83) | 1101110 6e [ 7]
    'T' ( 84) | 1101111 6f [ 7]
    'U' ( 85) | 1110000 70 [ 7]
    'V' ( 86) | 1110001 71 [ 7]
    'W' ( 87) | 1110010 72 [ 7]
    'X' ( 88) |11111100 fc [ 8]
    '**(89) | 1110011 73 [ 7]
    'Z' ( 90) |11111101 fd [ 8]
    '[' ( 91) | 11111111 | 11011 1ffb [13]
    ' ( 92) | 11111111 | 11111110 | 000 7fff0 [19]
    ']' ( 93) | 11111111 | 11100 1ffc [13]
    '^' ( 94) | 11111111 | 111100 3ffc [14]
    '_' ( 95) | 100010 22 [ 6]
    ''' ( 96) | 11111111 | 1111101 7ffd [15]
    'a' ( 97) | 00011 3 [ 5]
    'B' (98) | 100011 23 [ 6]
    'c' ( 99) | 00100 4 [ 5]
    'd' (100) | 100100 24 [ 6]
    'e' (101) | 00101 5 [ 5]
    'f' (102) | 100101 25 [ 6]
    'g' (103) | 100110 26 [ 6]
    'h' (104) | 100111 27 [ 6]
    'I' (105) | 00110 6 [ 5]
    'j' (106) | 1110100 74 [ 7]
    'k' (107) | 1110101 75 [ 7]
    'l' (108) | 101000 28 [ 6]
    'm' (109) | 101001 29 [ 6]
    Peon & Ruellan Standards Track [Page 29]
    RFC 7541 HPACK May 2015
    'n' (110) | 101010 2a [ 6]
    'o' (111) | 00111 7 [ 5]
    'p' (112) | 101011 2b [ 6]
    'q' (113) | 1110110 76 [ 7]
    'r' (114) | 101100 2c [ 6]
    's' (115) | 01000 8 [ 5]
    't' (116) | 01001 9 [ 5]
    'u' (117) | 101101 2d [ 6]
    'v' (118) | 1110111 77 [ 7]
    'w' (119) | 1111000 78 [ 7]
    'x' (120) | 1111001 79 [ 7]
    'y' (121) | 1111010 7a [ 7]
    'z' (122) | 1111011 7b [ 7]
    '{' (123) | 11111111 | 1111110 7ffe [15]
    '|' (124) | 11111111 | 100 7fc [11]
    '}' (125) | 11111111 | 111101 3ffd [14]
    '~' (126) | 11111111 | 11101 1ffd [13]
    (127) |11111111|11111111|11111111|1100 ffffffc [28]
    (128) | 11111111 | 11111110 | 0110 fffe6 [20]
    (129) | 11111111 | 11111111 | 010010 3fffd2 [22]
    (130) | 11111111 | 11111110 | 0111 fffe7 [20]
    (131) | 11111111 | 11111110 | 1000 fffe8 [20]
    (132) | 11111111 | 11111111 | 010011 3fffd3 [22]
    (133) | 11111111 | 11111111 | 010100 3fffd4 [22]
    (134) | 11111111 | 11111111 | 010101 3fffd5 [22]
    (135) | 11111111 | 11111111 | 1011001 7fffd9 [23]
    (136) | 11111111 | 11111111 | 010110 3fffd6 [22]
    (137) | 11111111 | 11111111 | 1011010 7fffda [23]
    (138) | 11111111 | 11111111 | 1011011 7fffdb [23]
    (139) | 11111111 | 11111111 | 1011100 7fffdc [23]
    (140) | 11111111 | 11111111 | 1011101 7fffdd [23]
    (141) | 11111111 | 11111111 | 1011110 7fffde [23]
    (142) |11111111|11111111|11101011 ffffeb [24]
    (143) | 11111111 | 11111111 | 1011111 7fffdf [23]
    (144) |11111111|11111111|11101100 ffffec [24]
    (145) |11111111|11111111|11101101 ffffed [24]
    (146) | 11111111 | 11111111 | 010111 3fffd7 [22]
    (147) | 11111111 | 11111111 | 1100000 7fffe0 [23]
    (148) |11111111|11111111|11101110 ffffee [24]
    (149) | 11111111 | 11111111 | 1100001 7fffe1 [23]
    (150) | 11111111 | 11111111 | 1100010 7fffe2 [23]
    (151) | 11111111 | 11111111 | 1100011 7ffhale [23]
    (152) | 11111111 | 11111111 | 1100100 7fffe4 [23]
    (153) | 11111111 | 11111110 | 11100 1fffdc [21]
    (154) | 11111111 | 11111111 | 011000 3fffd8 [22]
    (155) | 11111111 | 11111111 | 1100101 7fffe5 [23]
    (156) | 11111111 | 11111111 | 011001 3fffd9 [22]
    (157) | 11111111 | 11111111 | 1100110 7fffe6 [23]
    Peon & Ruellan Standards Track [Page 30]
    RFC 7541 HPACK May 2015
    (158) | 11111111 | 11111111 | 1100111 7fffe7 [23]
    (159) |11111111|11111111|11101111 ffffef [24]
    (160) | 11111111 | 11111111 | 011010 3fffda [22]
    (161) | 11111111 | 11111110 | 11101 1fffdd [21]
    (162) | 11111111 | 11111110 | 1001 fffe9 [20]
    (163) | 11111111 | 11111111 | 011011 3fffdb [22]
    (164) | 11111111 | 11111111 | 011100 3fffdc [22]
    (165) | 11111111 | 11111111 | 1101000 7fffe8 [23]
    (166) | 11111111 | 11111111 | 1101001 7fffe9 [23]
    (167) | 11111111 | 11111110 | 11110 1fffde [21]
    (168) | 11111111 | 11111111 | 1101010 7fffea [23]
    (169) | 11111111 | 11111111 | 011101 3fffdd [22]
    (170) | 11111111 | 11111111 | 011110 3fffde [22]
    (171) | 11111111 | 11111111 | 11110000 fffff0 [24]
    (172) | 11111111 | 11111110 | 11111 1fffdf [21]
    (173) | 11111111 | 11111111 | 011111 3fffdf [22]
    (174) | 11111111 | 11111111 | 1101011 7fffeb [23]
    (175) | 11111111 | 11111111 | 1101100 7fffec [23]
    (176) | 11111111 | 11111111 | 00000 1fffe0 [21]
    (177) | 11111111 | 11111111 | 00001 1fffe1 [21]
    (178) | 11111111 | 11111111 | 100000 3fffe0 [22]
    (179) | 11111111 | 11111111 | 00010 1fffe2 [21]
    (180) | 11111111 | 11111111 | 1101101 7fffed [23]
    (181) | 11111111 | 11111111 | 100001 3fffe1 [22]
    (182) | 11111111 | 11111111 | 1101110 7fffee [23]
    (183) | 11111111 | 11111111 | 1101111 7fffef [23]
    (184) |11111111|11111110|1010 fffea [20]
    (185) | 11111111 | 11111111 | 100010 3fffe2 [22]
    (186) | 11111111 | 11111111 | 100011 3ffhale [22]
    (187) | 11111111 | 11111111 | 100100 3fffe4 [22]
    (188) | 11111111 | 11111111 | 1110000 7ffff0 [23]
    (189) | 11111111 | 11111111 | 100101 3fffe5 [22]
    (190) | 11111111 | 11111111 | 100110 3fffe6 [22]
    (191) | 11111111 | 11111111 | 1110001 7ffff1 [23]
    (192) | 11111111 | 11111111 | 11111000 | 00 3ffffe0 [26]
    (193) | 11111111 | 11111111 | 11111000 | 01 3ffffe1 [26]
    (194) |11111111|11111110|1011 fffeb [20]
    (195) | 11111111 | 11111110 | 001 7fff1 [19]
    (196) | 11111111 | 11111111 | 100111 3fffe7 [22]
    (197) | 11111111 | 11111111 | 1110010 7ffff2 [23]
    (198) | 11111111 | 11111111 | 101000 3fffe8 [22]
    (199) | 11111111 | 11111111 | 11110110 | 0 1ffffec [25]
    (200) | 11111111 | 11111111 | 11111000 | 10 3ffffe2 [26]
    (201) | 11111111 | 11111111 | 11111000 | 11 3ffffe3 [26]
    (202) | 11111111 | 11111111 | 11111001 | 00 3ffffe4 [26]
    (203) | 11111111 | 11111111 | 11111011 | 110 7ffffde [27]
    (204) | 11111111 | 11111111 | 11111011 | 111 7ffffdf [27]
    (205) | 11111111 | 11111111 | 11111001 | 01 3ffffe5 [26]
    Peon & Ruellan Standards Track [Page 31]
    RFC 7541 HPACK May 2015
    (206) | 11111111 | 11111111 | 11110001 fffff1 [24]
    (207) | 11111111 | 11111111 | 11110110 | 1 1ffffed [25]
    (208) | 11111111 | 11111110 | 010 7fff2 [19]
    (209) | 11111111 | 11111111 | 00011 1ffhale [21]
    (210) | 11111111 | 11111111 | 11111001 | 10 3ffffe6 [26]
    (211) | 11111111 | 11111111 | 11111100 | 000 7ffffe0 [27]
    (212) | 11111111 | 11111111 | 11111100 | 001 7ffffe1 [27]
    (213) | 11111111 | 11111111 | 11111001 | 11 3ffffe7 [26]
    (214) | 11111111 | 11111111 | 11111100 | 010 7ffffe2 [27]
    (215) | 11111111 | 11111111 | 11110010 fffff2 [24]
    (216) | 11111111 | 11111111 | 00100 1fffe4 [21]
    (217) | 11111111 | 11111111 | 00101 1fffe5 [21]
    (218) | 11111111 | 11111111 | 11111010 | 00 3ffffe8 [26]
    (219) | 11111111 | 11111111 | 11111010 | 01 3ffffe9 [26]
    (220) |11111111|11111111|11111111|1101 ffffffd [28]
    (221) | 11111111 | 11111111 | 11111100 | 011 7ffffe3 [27]
    (222) | 11111111 | 11111111 | 11111100 | 100 7ffffe4 [27]
    (223) | 11111111 | 11111111 | 11111100 | 101 7ffffe5 [27]
    (224) |11111111|11111110|1100 fffec [20]
    (225) | 11111111 | 11111111 | 11110011 fffff3 [24]
    (226) |11111111|11111110|1101 fffed [20]
    (227) | 11111111 | 11111111 | 00110 1fffe6 [21]
    (228) | 11111111 | 11111111 | 101001 3fffe9 [22]
    (229) | 11111111 | 11111111 | 00111 1fffe7 [21]
    (230) | 11111111 | 11111111 | 01000 1fffe8 [21]
    (231) | 11111111 | 11111111 | 1110011 7ffff3 [23]
    (232) | 11111111 | 11111111 | 101010 3fffea [22]
    (233) | 11111111 | 11111111 | 101011 3fffeb [22]
    (234) | 11111111 | 11111111 | 11110111 | 0 1ffffee [25]
    (235) | 11111111 | 11111111 | 11110111 | 1 1ffffef [25]
    (236) | 11111111 | 11111111 | 11110100 fffff4 [24]
    (237) | 11111111 | 11111111 | 11110101 fffff5 [24]
    (238) | 11111111 | 11111111 | 11111010 | 10 3ffffea [26]
    (239) | 11111111 | 11111111 | 1110100 7ffff4 [23]
    (240) | 11111111 | 11111111 | 11111010 | 11 3ffffeb [26]
    (241) | 11111111 | 11111111 | 11111100 | 110 7ffffe6 [27]
    (242) | 11111111 | 11111111 | 11111011 | 00 3ffffec [26]
    (243) | 11111111 | 11111111 | 11111011 | 01 3ffffed [26]
    (244) | 11111111 | 11111111 | 11111100 | 111 7ffffe7 [27]
    (245) | 11111111 | 11111111 | 11111101 | 000 7ffffe8 [27]
    (246) | 11111111 | 11111111 | 11111101 | 001 7ffffe9 [27]
    (247) | 11111111 | 11111111 | 11111101 | 010 7ffffea [27]
    (248) | 11111111 | 11111111 | 11111101 | 011 7ffffeb [27]
    (249) |11111111|11111111|11111111|1110 ffffffe [28]
    (250) | 11111111 | 11111111 | 11111101 | 100 7ffffec [27]
    (251) | 11111111 | 11111111 | 11111101 | 101 7ffffed [27]
    (252) | 11111111 | 11111111 | 11111101 | 110 7ffffee [27]
    (253) | 11111111 | 11111111 | 11111101 | 111 7ffffef [27]
    Peon & Ruellan Standards Track [Page 32]
    RFC 7541 HPACK May 2015
    (254) | 11111111 | 11111111 | 11111110 | 000 7fffff0 [27]
    (255) | 11111111 | 11111111 | 11111011 | 10 3ffffee [26]
    EOS (256) |11111111|11111111|11111111|111111 3fffffff [30]
    ReferenceRFC7541If H is 0, the encoded data is the original eight-bit byte of the string. If H is 1, the encoded data is the Huffman encoding of string characters:

    AccordingRFC7541For the Huffman encoding translation table, we need to pay attention to the length bit of the last line, that is, the encoding length:

    It can be seen that the shortest encoding length is 5 bits. After sorting out the 5-bit characters, it is:
    Plain Text
     
    Copy code
    0 | 1 | 2 | a | c | e | I | o | s | t |
    Now we replace the original 8-bit long characters with 5-bit short characters, which compresses client requests:

    In this way, when we make the first dynamic table recording request for different resources of the same website, the consumption of our own requests is greatly reduced, thus saving machine resources, to initiate more attack connections.
    (To be continued)
The content of this article comes from the network collection of netizens. It is used as a learning reference. The copyright belongs to the original author.
THE END
分享
二维码
< <上一篇
下一篇>>