March 27, 2017 | Views: 4380

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hello Cybrarians!

I think all of you would be familiar with Mr. Robot, or at least know that it is a television series. Anyway, I noticed while watching Mr. Robot, that Eliot recognized an attack, name RUDY.

RUDY stands for R U Dead Yet? It is a slow and low rate, application layer exploitation tool. When an attacker uses the rudy tool, it sends a legitimate HTTP POST request with an abnormally long ‘content-length’ header field and then it starts injecting the form with information, one byte-sized packet at a random time and generates a few thousand requests. By sending numerous small packets, at a very slow rate, R.U.D.Y. creates a massive backlog of application threads, while the long ‘’Content-Length’ field prevents the server from closing the connection.

Eventually, the number and length of open sessions exhaust the target’s resources, making it unavailable to legitimate traffic. It is a form of Denial of Service attack. Here a video where you can understand more specifically what the attack is:

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Great article,
    Sometimes the low-tech approach, is the hi-tech way of producing results.

    Thanks for your time.

  2. I was surprised to be taught something by this TV series, but the first episode was only the first of many surprises in what I could consider one of the most accurate hacking themed productions of the entertainment industry. Still not accurate enough to consider it worthy of comparing to reality, but knowing that the producers and the men behind the cameras did their homework before scripting and directing the actors.

    Nothing has been more insulting to the rest of us as to see bogus “hacking” like this little gem from NCIS: https://www.youtube.com/watch?v=u8qgehH3kEQ

    Thanks for posting this. It’s a very good high-level explanation of the RUDY attack, which I looked up after seeing this scene, admittedly, to see if they were just making it up. Glad to be wrong. It was a very cool finding. 🙂

  3. Interesting way of creating DoS after a fairly long period of time… Thanks for this! +10

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?