Advertisement
Guest User

Untitled

a guest
Apr 22nd, 2019
166
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.05 KB | None | 0 0
  1. ================================================================================
  2.  
  3.  
  4. [+] Web Application Security Report - Arachni Framework
  5.  
  6. [~] Report generated on: 2019-04-22 23:08:24 +0700
  7. [~] Report false positives at: http://github.com/Arachni/arachni/issues
  8.  
  9. [+] System settings:
  10. [~] ---------------
  11. [~] Version: 1.5.1
  12. [~] Seed: bc595af8655860d3e7786b7dcad2916a
  13. [~] Audit started on: 2019-04-22 23:04:00 +0700
  14. [~] Audit finished on: 2019-04-22 23:08:23 +0700
  15. [~] Runtime: 00:04:23
  16.  
  17. [~] URL: https://lab12.netlab.kasetsart.org/
  18. [~] User agent: Arachni/v1.5.1
  19.  
  20. [*] Audited elements:
  21. [~] * Links
  22. [~] * Forms
  23. [~] * Cookies
  24. [~] * XMLs
  25. [~] * JSONs
  26. [~] * UI inputs
  27. [~] * UI forms
  28.  
  29. [*] Checks: os_cmd_injection_timing, source_code_disclosure, xss_dom_script_context, path_traversal, file_inclusion, ldap_injection, xss_event, sql_injection_timing, xxe, unvalidated_redirect_dom, csrf, code_injection, trainer, sql_injection, xss_path, xss_dom, xss_script_context, unvalidated_redirect, no_sql_injection_differential, code_injection_php_input_wrapper, sql_injection_differential, xpath_injection, xss_tag, session_fixation, xss, response_splitting, no_sql_injection, os_cmd_injection, rfi, code_injection_timing, credit_card, cookie_set_for_parent_domain, x_frame_options, unencrypted_password_forms, http_only_cookies, password_autocomplete, html_objects, ssn, mixed_resource, form_upload, insecure_cookies, captcha, insecure_cors_policy, private_ip, hsts, cvs_svn_users, emails, allowed_methods, interesting_responses, insecure_cross_domain_policy_access, insecure_client_access_policy, http_put, backup_files, backup_directories, origin_spoof_access_restriction_bypass, xst, common_admin_interfaces, backdoors, insecure_cross_domain_policy_headers, directory_listing, htaccess_limit, localstart_asp, common_directories, common_files, webdav
  30.  
  31. [~] ===========================
  32.  
  33. [+] 10 issues were detected.
  34.  
  35. [+] [1] HTTP TRACE (Trusted)
  36. [~] ~~~~~~~~~~~~~~~~~~~~
  37. [~] Digest: 1774520815
  38. [~] Severity: Medium
  39. [~] Description:
  40. [~]
  41. The `TRACE` HTTP method allows a client so send a request to the server, and
  42. have the same request then send back in the server's response. This allows the
  43. client to determine if the server is receiving the request as expected or if
  44. specific parts of the request are not arriving as expected.
  45. For example incorrect encoding or a load balancer has filtered or changed a value.
  46. On many default installations the `TRACE` method is still enabled.
  47.  
  48. While not vulnerable by itself, it does provide a method for cyber-criminals to
  49. bypass the `HTTPOnly` cookie flag, and therefore could allow a XSS attack to
  50. successfully access a session token.
  51.  
  52. Arachni has discovered that the affected page permits the HTTP `TRACE` method.
  53.  
  54. [~] Tags: xst, methods, trace, server
  55.  
  56. [~] CWE: http://cwe.mitre.org/data/definitions/693.html
  57. [~] References:
  58. [~] CAPEC - http://capec.mitre.org/data/definitions/107.html
  59. [~] OWASP - http://www.owasp.org/index.php/Cross_Site_Tracing
  60.  
  61. [~] URL: https://lab12.netlab.kasetsart.org/
  62. [~] Element: server
  63.  
  64. [~] Proof: "HTTP/1.1 200 OK"
  65.  
  66. [~] Referring page: https://lab12.netlab.kasetsart.org/
  67.  
  68. [~] Affected page: https://lab12.netlab.kasetsart.org/
  69. [~] HTTP request
  70. TRACE / HTTP/1.1
  71. Host: lab12.netlab.kasetsart.org
  72. Accept-Encoding: gzip, deflate
  73. User-Agent: Arachni/v1.5.1
  74. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  75. Accept-Language: en-US,en;q=0.8,he;q=0.6
  76. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  77. Cookie: PHPSESSID=3d4fceb59hmoauo52lcvv2pqa1
  78.  
  79.  
  80.  
  81. [+] [2] Missing 'Strict-Transport-Security' header (Trusted)
  82. [~] ~~~~~~~~~~~~~~~~~~~~
  83. [~] Digest: 1277351082
  84. [~] Severity: Medium
  85. [~] Description:
  86. [~]
  87. The HTTP protocol by itself is clear text, meaning that any data that is
  88. transmitted via HTTP can be captured and the contents viewed. To keep data
  89. private and prevent it from being intercepted, HTTP is often tunnelled through
  90. either Secure Sockets Layer (SSL) or Transport Layer Security (TLS).
  91. When either of these encryption standards are used, it is referred to as HTTPS.
  92.  
  93. HTTP Strict Transport Security (HSTS) is an optional response header that can be
  94. configured on the server to instruct the browser to only communicate via HTTPS.
  95. This will be enforced by the browser even if the user requests a HTTP resource
  96. on the same server.
  97.  
  98. Cyber-criminals will often attempt to compromise sensitive information passed
  99. from the client to the server using HTTP. This can be conducted via various
  100. Man-in-The-Middle (MiTM) attacks or through network packet captures.
  101.  
  102. Arachni discovered that the affected application is using HTTPS however does not
  103. use the HSTS header.
  104.  
  105. [~] Tags:
  106.  
  107. [~] CWE: http://cwe.mitre.org/data/definitions/200.html
  108. [~] References:
  109. [~] OWASP - https://www.owasp.org/index.php/HTTP_Strict_Transport_Security
  110. [~] Wikipedia - http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
  111.  
  112. [~] URL: https://lab12.netlab.kasetsart.org/
  113. [~] Element: server
  114.  
  115. [~] Proof: "HTTP/1.1 200 OK"
  116.  
  117. [~] Referring page: https://lab12.netlab.kasetsart.org/
  118.  
  119. [~] Affected page: https://lab12.netlab.kasetsart.org/
  120. [~] HTTP request
  121. GET / HTTP/1.1
  122. Host: lab12.netlab.kasetsart.org
  123. Accept-Encoding: gzip, deflate
  124. User-Agent: Arachni/v1.5.1
  125. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  126. Accept-Language: en-US,en;q=0.8,he;q=0.6
  127. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  128.  
  129.  
  130.  
  131. [+] [3] Password field with auto-complete (Trusted)
  132. [~] ~~~~~~~~~~~~~~~~~~~~
  133. [~] Digest: 1603242756
  134. [~] Severity: Low
  135. [~] Description:
  136. [~]
  137. In typical form-based web applications, it is common practice for developers to
  138. allow `autocomplete` within the HTML form to improve the usability of the page.
  139. With `autocomplete` enabled (default), the browser is allowed to cache previously
  140. entered form values.
  141.  
  142. For legitimate purposes, this allows the user to quickly re-enter the same data
  143. when completing the form multiple times.
  144.  
  145. When `autocomplete` is enabled on either/both the username and password fields,
  146. this could allow a cyber-criminal with access to the victim's computer the ability
  147. to have the victim's credentials automatically entered as the cyber-criminal
  148. visits the affected page.
  149.  
  150. Arachni has discovered that the affected page contains a form containing a
  151. password field that has not disabled `autocomplete`.
  152.  
  153. [~] Tags:
  154. [~] References:
  155.  
  156. [~] URL: https://lab12.netlab.kasetsart.org/regis.php
  157. [~] Element: form
  158. [~] All inputs: user, pass, repass, btn
  159.  
  160.  
  161. [~] Referring page: https://lab12.netlab.kasetsart.org/regis.php
  162.  
  163. [~] Affected page: https://lab12.netlab.kasetsart.org/regis.php
  164. [~] HTTP request
  165. GET /regis.php HTTP/1.1
  166. Host: lab12.netlab.kasetsart.org
  167. Accept-Encoding: gzip, deflate
  168. User-Agent: Arachni/v1.5.1
  169. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  170. Accept-Language: en-US,en;q=0.8,he;q=0.6
  171. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  172. Cookie: PHPSESSID=3d4fceb59hmoauo52lcvv2pqa1_arachni_trainer_bc595af8655860d3e7786b7dcad2916a
  173.  
  174.  
  175.  
  176. [+] [4] Password field with auto-complete (Trusted)
  177. [~] ~~~~~~~~~~~~~~~~~~~~
  178. [~] Digest: 495624201
  179. [~] Severity: Low
  180. [~] Description:
  181. [~]
  182. In typical form-based web applications, it is common practice for developers to
  183. allow `autocomplete` within the HTML form to improve the usability of the page.
  184. With `autocomplete` enabled (default), the browser is allowed to cache previously
  185. entered form values.
  186.  
  187. For legitimate purposes, this allows the user to quickly re-enter the same data
  188. when completing the form multiple times.
  189.  
  190. When `autocomplete` is enabled on either/both the username and password fields,
  191. this could allow a cyber-criminal with access to the victim's computer the ability
  192. to have the victim's credentials automatically entered as the cyber-criminal
  193. visits the affected page.
  194.  
  195. Arachni has discovered that the affected page contains a form containing a
  196. password field that has not disabled `autocomplete`.
  197.  
  198. [~] Tags:
  199. [~] References:
  200.  
  201. [~] URL: https://lab12.netlab.kasetsart.org/index.php
  202. [~] Element: form
  203. [~] All inputs: user, pass, btn
  204.  
  205.  
  206. [~] Referring page: https://lab12.netlab.kasetsart.org/
  207.  
  208. [~] Affected page: https://lab12.netlab.kasetsart.org/
  209. [~] HTTP request
  210. GET / HTTP/1.1
  211. Host: lab12.netlab.kasetsart.org
  212. Accept-Encoding: gzip, deflate
  213. User-Agent: Arachni/v1.5.1
  214. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  215. Accept-Language: en-US,en;q=0.8,he;q=0.6
  216. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  217.  
  218.  
  219.  
  220. [+] [5] Missing 'X-Frame-Options' header (Trusted)
  221. [~] ~~~~~~~~~~~~~~~~~~~~
  222. [~] Digest: 534340495
  223. [~] Severity: Low
  224. [~] Description:
  225. [~]
  226. Clickjacking (User Interface redress attack, UI redress attack, UI redressing)
  227. is a malicious technique of tricking a Web user into clicking on something different
  228. from what the user perceives they are clicking on, thus potentially revealing
  229. confidential information or taking control of their computer while clicking on
  230. seemingly innocuous web pages.
  231.  
  232. The server didn't return an `X-Frame-Options` header which means that this website
  233. could be at risk of a clickjacking attack.
  234.  
  235. The `X-Frame-Options` HTTP response header can be used to indicate whether or not
  236. a browser should be allowed to render a page inside a frame or iframe. Sites can
  237. use this to avoid clickjacking attacks, by ensuring that their content is not
  238. embedded into other sites.
  239.  
  240. [~] Tags:
  241.  
  242. [~] CWE: http://cwe.mitre.org/data/definitions/693.html
  243. [~] References:
  244. [~] MDN - https://developer.mozilla.org/en-US/docs/Web/HTTP/X-Frame-Options
  245. [~] RFC - http://tools.ietf.org/html/rfc7034
  246. [~] OWASP - https://www.owasp.org/index.php/Clickjacking
  247.  
  248. [~] URL: https://lab12.netlab.kasetsart.org/
  249. [~] Element: server
  250.  
  251. [~] Proof: "HTTP/1.1 200 OK"
  252.  
  253. [~] Referring page: https://lab12.netlab.kasetsart.org/
  254.  
  255. [~] Affected page: https://lab12.netlab.kasetsart.org/
  256. [~] HTTP request
  257. GET / HTTP/1.1
  258. Host: lab12.netlab.kasetsart.org
  259. Accept-Encoding: gzip, deflate
  260. User-Agent: Arachni/v1.5.1
  261. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  262. Accept-Language: en-US,en;q=0.8,he;q=0.6
  263. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  264.  
  265.  
  266.  
  267. [+] [6] Interesting response (Trusted)
  268. [~] ~~~~~~~~~~~~~~~~~~~~
  269. [~] Digest: 895858860
  270. [~] Severity: Informational
  271. [~] Description:
  272. [~]
  273. The server responded with a non 200 (OK) nor 404 (Not Found) status code.
  274. This is a non-issue, however exotic HTTP response status codes can provide useful
  275. insights into the behavior of the web application and assist with the penetration test.
  276.  
  277. [~] Tags: interesting, response, server
  278. [~] References:
  279. [~] w3.org - http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
  280.  
  281. [~] URL: https://lab12.netlab.kasetsart.org/index.php
  282. [~] Element: server
  283.  
  284. [~] Proof: "HTTP/1.1 302 Found"
  285.  
  286. [~] Referring page: https://lab12.netlab.kasetsart.org/
  287.  
  288. [~] Affected page: https://lab12.netlab.kasetsart.org/index.php
  289. [~] HTTP request
  290. POST /index.php HTTP/1.1
  291. Host: lab12.netlab.kasetsart.org
  292. Accept-Encoding: gzip, deflate
  293. User-Agent: Arachni/v1.5.1
  294. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  295. Referer: https://lab12.netlab.kasetsart.org/index.php
  296. Origin: https://lab12.netlab.kasetsart.org
  297. Content-Type: application/x-www-form-urlencoded
  298. Content-Length: 11
  299. Cookie: PHPSESSID=3d4fceb59hmoauo52lcvv2pqa1
  300. Accept-Language: en-US,*
  301.  
  302. user=&pass=
  303.  
  304. [+] [7] Interesting response (Trusted)
  305. [~] ~~~~~~~~~~~~~~~~~~~~
  306. [~] Digest: 176711166
  307. [~] Severity: Informational
  308. [~] Description:
  309. [~]
  310. The server responded with a non 200 (OK) nor 404 (Not Found) status code.
  311. This is a non-issue, however exotic HTTP response status codes can provide useful
  312. insights into the behavior of the web application and assist with the penetration test.
  313.  
  314. [~] Tags: interesting, response, server
  315. [~] References:
  316. [~] w3.org - http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
  317.  
  318. [~] URL: https://lab12.netlab.kasetsart.org/cgi-bin/
  319. [~] Element: server
  320.  
  321. [~] Proof: "HTTP/1.1 403 Forbidden"
  322.  
  323. [~] Referring page: https://lab12.netlab.kasetsart.org/
  324.  
  325. [~] Affected page: https://lab12.netlab.kasetsart.org/cgi-bin/
  326. [~] HTTP request
  327. GET /cgi-bin/ HTTP/1.1
  328. Host: lab12.netlab.kasetsart.org
  329. Accept-Encoding: gzip, deflate
  330. User-Agent: Arachni/v1.5.1
  331. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  332. Accept-Language: en-US,en;q=0.8,he;q=0.6
  333. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  334. Cookie: PHPSESSID=3d4fceb59hmoauo52lcvv2pqa1
  335.  
  336.  
  337.  
  338. [+] [8] Interesting response (Trusted)
  339. [~] ~~~~~~~~~~~~~~~~~~~~
  340. [~] Digest: 2968602822
  341. [~] Severity: Informational
  342. [~] Description:
  343. [~]
  344. The server responded with a non 200 (OK) nor 404 (Not Found) status code.
  345. This is a non-issue, however exotic HTTP response status codes can provide useful
  346. insights into the behavior of the web application and assist with the penetration test.
  347.  
  348. [~] Tags: interesting, response, server
  349. [~] References:
  350. [~] w3.org - http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html
  351.  
  352. [~] URL: https://lab12.netlab.kasetsart.org/Arachni-bc595af8655860d3e7786b7dcad2916a
  353. [~] Element: server
  354.  
  355. [~] Proof: "HTTP/1.1 100 Continue"
  356.  
  357. [~] Referring page: https://lab12.netlab.kasetsart.org/
  358.  
  359. [~] Affected page: https://lab12.netlab.kasetsart.org/Arachni-bc595af8655860d3e7786b7dcad2916a
  360. [~] HTTP request
  361. PUT /Arachni-bc595af8655860d3e7786b7dcad2916a HTTP/1.1
  362. Host: lab12.netlab.kasetsart.org
  363. Accept-Encoding: gzip, deflate
  364. User-Agent: Arachni/v1.5.1
  365. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  366. Accept-Language: en-US,en;q=0.8,he;q=0.6
  367. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  368. Cookie: PHPSESSID=3d4fceb59hmoauo52lcvv2pqa1
  369. Content-Length: 55
  370. Expect: 100-continue
  371.  
  372. Created by Arachni. PUTbc595af8655860d3e7786b7dcad2916a
  373.  
  374. [+] [9] Insecure cookie (Trusted)
  375. [~] ~~~~~~~~~~~~~~~~~~~~
  376. [~] Digest: 2311377353
  377. [~] Severity: Informational
  378. [~] Description:
  379. [~]
  380. HTTP by itself is a stateless protocol. Therefore the server is unable to determine
  381. which requests are performed by which client, and which clients are authenticated
  382. or unauthenticated.
  383.  
  384. The use of HTTP cookies within the headers, allows a web server to identify each
  385. individual client and can therefore determine which clients hold valid
  386. authentication, from those that do not. These are known as session cookies.
  387.  
  388. When a cookie is set by the server (sent the header of an HTTP response) there
  389. are several flags that can be set to configure the properties of the cookie and
  390. how it is to be handled by the browser.
  391.  
  392. One of these flags is known as the `secure` flag. When the secure flag is set,
  393. the browser will prevent it from being sent over a clear text channel (HTTP) and
  394. only allow it to be sent when an encrypted channel is used (HTTPS).
  395.  
  396. Arachni discovered that a cookie was set by the server without the secure flag
  397. being set. Although the initial setting of this cookie was via an HTTPS
  398. connection, any HTTP link to the same server will result in the cookie being
  399. send in clear text.
  400.  
  401. [~] Tags:
  402.  
  403. [~] CWE: http://cwe.mitre.org/data/definitions/200.html
  404. [~] References:
  405. [~] SecureFlag - OWASP - https://www.owasp.org/index.php/SecureFlag
  406.  
  407. [~] URL: https://lab12.netlab.kasetsart.org/
  408. [~] Element: cookie
  409. [~] All inputs: PHPSESSID
  410.  
  411.  
  412. [~] Referring page: https://lab12.netlab.kasetsart.org/
  413.  
  414. [~] Affected page: https://lab12.netlab.kasetsart.org/
  415. [~] HTTP request
  416. GET / HTTP/1.1
  417. Host: lab12.netlab.kasetsart.org
  418. Accept-Encoding: gzip, deflate
  419. User-Agent: Arachni/v1.5.1
  420. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  421. Accept-Language: en-US,en;q=0.8,he;q=0.6
  422. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  423.  
  424.  
  425.  
  426. [+] [10] HttpOnly cookie (Trusted)
  427. [~] ~~~~~~~~~~~~~~~~~~~~
  428. [~] Digest: 2971506258
  429. [~] Severity: Informational
  430. [~] Description:
  431. [~]
  432. HTTP by itself is a stateless protocol. Therefore the server is unable to determine
  433. which requests are performed by which client, and which clients are authenticated
  434. or unauthenticated.
  435.  
  436. The use of HTTP cookies within the headers, allows a web server to identify each
  437. individual client and can therefore determine which clients hold valid
  438. authentication, from those that do not. These are known as session cookies.
  439.  
  440. When a cookie is set by the server (sent the header of an HTTP response) there
  441. are several flags that can be set to configure the properties of the cookie and
  442. how it is to be handled by the browser.
  443.  
  444. The `HttpOnly` flag assists in the prevention of client side-scripts (such as
  445. JavaScript) accessing and using the cookie.
  446.  
  447. This can help prevent XSS attacks targeting the cookies holding the client's
  448. session token (setting the `HttpOnly` flag does not prevent, nor safeguard against
  449. XSS vulnerabilities themselves).
  450.  
  451. [~] Tags:
  452.  
  453. [~] CWE: http://cwe.mitre.org/data/definitions/200.html
  454. [~] References:
  455. [~] HttpOnly - OWASP - https://www.owasp.org/index.php/HttpOnly
  456.  
  457. [~] URL: https://lab12.netlab.kasetsart.org/
  458. [~] Element: cookie
  459. [~] All inputs: PHPSESSID
  460.  
  461.  
  462. [~] Referring page: https://lab12.netlab.kasetsart.org/
  463.  
  464. [~] Affected page: https://lab12.netlab.kasetsart.org/
  465. [~] HTTP request
  466. GET / HTTP/1.1
  467. Host: lab12.netlab.kasetsart.org
  468. Accept-Encoding: gzip, deflate
  469. User-Agent: Arachni/v1.5.1
  470. Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
  471. Accept-Language: en-US,en;q=0.8,he;q=0.6
  472. X-Arachni-Scan-Seed: bc595af8655860d3e7786b7dcad2916a
  473.  
  474.  
  475.  
  476.  
  477. [+] Plugin data:
  478. [~] ---------------
  479.  
  480.  
  481. [*] Health map
  482. [~] ~~~~~~~~~~~~~~
  483. [~] Description: Generates a simple list of safe/unsafe URLs.
  484.  
  485. [~] Legend:
  486. [+] No issues
  487. [-] Has issues
  488.  
  489. [-] https://lab12.netlab.kasetsart.org/
  490. [-] https://lab12.netlab.kasetsart.org/Arachni-bc595af8655860d3e7786b7dcad2916a
  491. [-] https://lab12.netlab.kasetsart.org/cgi-bin/
  492. [+] https://lab12.netlab.kasetsart.org/home.php
  493. [-] https://lab12.netlab.kasetsart.org/index.php
  494. [+] https://lab12.netlab.kasetsart.org/logout.php
  495. [-] https://lab12.netlab.kasetsart.org/regis.php
  496.  
  497. [~] Total: 7
  498. [+] Without issues: 2
  499. [-] With issues: 5 ( 71% )
  500.  
  501. [~] Report saved at: /home/srakrn/Downloads/arachni-1.5.1-0.5.12/bin/lab12.netlab.kasetsart.org 2019-04-22 23_08_23 +0700.afr [0.02MB]
  502.  
  503. [~] Audited 13 page snapshots.
  504.  
  505. [~] Duration: 00:04:23
  506. [~] Processed 7059/7059 HTTP requests.
  507. [~] -- 254.512 requests/second.
  508. [~] Processed 225/225 browser jobs.
  509. [~] -- 0.289 second/job.
  510.  
  511. [~] Currently auditing https://lab12.netlab.kasetsart.org/home.php
  512. [~] Burst response time sum 2.594 seconds
  513. [~] Burst response count 310
  514. [~] Burst average response time 0.008 seconds
  515. [~] Burst average 0.0 requests/second
  516. [~] Timed-out requests 0
  517. [~] Original max concurrency 20
  518. [~] Throttled max concurrency 20
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement