rDOS
A tool I've been working on that looks to serve as a mini denial of service attack. It performs a SYN Flood attack against a target IP. I've written two modes of attack into it.
Usage : sudo rDOS.py [subnet] [targetIP/URL] [attack type]
options :
-p Include ping (Experimental)
-l uses the devices in the subnet specified as the source addresses in the attack (useful for -R)
-r random IP attack: generate random ip addresses to put into source value
-R Reverse the tcp connection i.e. send packet to ip add 'from' target ip
e.g.sudo python rDOS.py 127.0.0.1/24 196.168.0.1 -r -p
sudo python rDOS.py 127.0.0.1/24 example.com -r -R
-p is a ping tool in the script that looks to measure and gauge the performance of the target IP over the DOS attack. It takes an average of 25 ping round trip times and measure the server against initial performance.
-l uses just the devices IP's in the subnet that are "willing" to make a TCP connection with a foreign host
-r Generates random IP's as source addresses for the packets
-R Reverses the SYN connection and spoofs the packet as have coming from the target address to the source address, so that the source connects back to the
target.
Please chat to me about any comments or suggestions you have for the tool!
Dstar
FUTURE PLANS:
- I hope to in the future integrate a client/server architecture that allows for a coordinated distribution of attack over multiple machines.
INSTALL INSTRUCTIONS:
1. Download the script from here.
2. Make sure you have python and scapy installed.
3. Run rDos.py passing in your subnet, and then target IP and then attack method, followed by any optional commands.
Disclaimer:
This tool is provided to assist users of rDos in testing their own networks, or networks for which they have been given permission to test, in order to determine the ability of such networks to survive DDOS attacks. It is not intended for purposes beyond those allowed by law. I hereby disclaim any responsibility for actions taken based upon the information in this article, and urge all who seek information towards a destructive end to reconsider their life, and do something constructive instead.
A tool I've been working on that looks to serve as a mini denial of service attack. It performs a SYN Flood attack against a target IP. I've written two modes of attack into it.
- Random IP attack : In this mode, random IP addresses are set as the source address and sent to the target IP.
- LAN attack : This pulls devices in your own network, checks which of them are open to a TCP handshake and then uses their IP's as either source or destinations.
Usage : sudo rDOS.py [subnet] [targetIP/URL] [attack type]
options :
-p Include ping (Experimental)
-l uses the devices in the subnet specified as the source addresses in the attack (useful for -R)
-r random IP attack: generate random ip addresses to put into source value
-R Reverse the tcp connection i.e. send packet to ip add 'from' target ip
e.g.sudo python rDOS.py 127.0.0.1/24 196.168.0.1 -r -p
sudo python rDOS.py 127.0.0.1/24 example.com -r -R
-p is a ping tool in the script that looks to measure and gauge the performance of the target IP over the DOS attack. It takes an average of 25 ping round trip times and measure the server against initial performance.
-l uses just the devices IP's in the subnet that are "willing" to make a TCP connection with a foreign host
-r Generates random IP's as source addresses for the packets
-R Reverses the SYN connection and spoofs the packet as have coming from the target address to the source address, so that the source connects back to the
target.
Please chat to me about any comments or suggestions you have for the tool!
Dstar
FUTURE PLANS:
- I hope to in the future integrate a client/server architecture that allows for a coordinated distribution of attack over multiple machines.
INSTALL INSTRUCTIONS:
1. Download the script from here.
2. Make sure you have python and scapy installed.
3. Run rDos.py passing in your subnet, and then target IP and then attack method, followed by any optional commands.
Disclaimer:
This tool is provided to assist users of rDos in testing their own networks, or networks for which they have been given permission to test, in order to determine the ability of such networks to survive DDOS attacks. It is not intended for purposes beyond those allowed by law. I hereby disclaim any responsibility for actions taken based upon the information in this article, and urge all who seek information towards a destructive end to reconsider their life, and do something constructive instead.