Work at SourceForge, help us to make it a better place! We have an immediate need for a Support Technician in our San Francisco or Denver office.

Close

Tree [e86f9f] master /
History



File Date Author Commit
cfg 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
gui 2013-07-26 Metin KAYA Metin KAYA [e440e8] update revision
include 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
src 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
Makefile 2013-07-26 Metin KAYA Metin KAYA [e440e8] update revision
README 2013-07-26 Metin KAYA Metin KAYA [e86f9f] update revs.
compile_all.sh 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
fullrandom.config 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
fullstatic.config 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
randomip_staticport.config 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit
staticip_randomport.config 2013-07-25 Metin KAYA Metin KAYA [1866ca] Initial commit

Read Me

        NetStress-3.0.7 README
    ---------------------------------------

-- Installation:
First, configure your installation:
# make menuconfig

Note that this command requires libncursesw5 installed on your system. If you don't want to use that way,
then just copy one of *.config (e.g., fullrandom.config if you want source IP/port be random) file as '.config'.

Then compile the codes:
# make

Now, netstress* (suffix depends on your configuration) binary can be executed.

-- Sample usages:
Please note that only root user can run NetStress.
Running netstress without a parameter cause it to print a help message:

$ sudo ./netstress_fullrandom

        Metin KAYA <kayameti@gmail.com> from EnderUNIX SDT [http://www.EnderUNIX.org]
            NETSTRESS a.k.a SALDIRAY v3.0.7

        --saddr,     -s:  source address
        --sport,     -p:  source port
        --daddr,     -d:  destination address
        --dport,     -P:  destination port
        --file,      -f:  the full path for the file of dns server list for ampdns flood
        --attack,    -a:  type of attack (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98,
                  get, post, syncook, isssyn)
        --process,   -n:  number of processes
        --buffer,    -b:  size of UDP packet
        --dnsqname,  -N:  hostname which will be queried
        --dnsqtype,  -t:  type of dns query (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt)
        --useragent, -u:  user agent parameter for http get flood
        --help,      -h:  shows this message

It's an example SYN flood from source IP address 1.1.1.1 and port 8888 to destination IP address 2.2.2.2 and port 9999 just with 1 process:
$ sudo ./netstress_fullrandom -s 1.1.1.1 -p 8888 -d 2.2.2.2 -P 9999 -a syn -n 1

You don't need to specify source port if you compiled netstress with random source port feature. Same logic is valid for source IP and destination IP/port.

For Python interface: NetStress GUI depends on python-wx library.
$ cd gui
$ python netstress.py


EnderUNIX SDT @ Istanbul/Turkey
kayameti@gmail.com
http://www.enderunix.org

Thu Jul 25 14:08:08 EEST 2013