Proof of concept denial of service over TOR stress test tool. Is multi-threaded and supports multiple attack vectors.
$ ./main.py <mode> <target URL> [--options]
There are three modes:
singleshot
- Naively hit a single URLfullauto
- Scrape the site for links and hits as many as possibleslowloris
- Slow Loris low bandwidth DoS
Options:
--tor-address
- TOR proxy IP to connect via (default = 127.0.0.1)--tor-proxy-port
- TOR proxy port to connect via (default = 9050)--tor-ctrl-port
- TOR control port to connect to for requesting new idents etc. (default = 9051)--num-soldiers
- The number of soldier threads to spawn (default = 10)--http-method
- The HTTP method to use for requests, e.g. GET, HEAD, POST, etc. (default = GET)--cache-buster
- Add a cache busting query string to all requests (default = False)--num-sockets
- Number of sockets to open per thread for Slow Loris attacks (default = 100)
Running a slow loris attack:
$ ./main.py slowloris http://target_url --num-soldiers=25 --cache-buster --num-sockets=200
Running a full auto attack:
$ ./main.py fullauto http://target_url --num-soldiers=50 --http-method=POST --cache-buster
- Travis CI set up
- Monitor to work out bytes sent / received
- Application specific attacks - e.g. https://www.exploit-db.com/exploits/43968/