What this script does is send post request to apache server. Also it spoofs the user agent to make it look like legit traffic is requesting from the target. Rudy stands for r-u-dead-yet. Rudy uses proxy's to send packets to the target. This type of attack is considered a layer 7 attack also known as an Application Layer attack. It achieves it's goal by using long form field submissions. By injecting one byte of information into an application POST field at a time and then waiting, Rudy causes application threads to await the end of never-ending posts in order to perform processing (this behavior is necessary in order to allow web servers to support users with slower connections). Since Rudy causes the target webserver to hang while waiting for the rest of an HTTP POST request, by initiating simultaneous connections to the server the attacker is ultimately able to exhaust the server’s connection table. This script is coded in C.
The source code can be found here: http://pastebin.com/0rC9Qp4L
Since the site restricts how many characters can be in a thread.
The source code can be found here: http://pastebin.com/0rC9Qp4L
Since the site restricts how many characters can be in a thread.