NetStress-NG Code
NetStress is a DDoS and network stress testing tool.
Status: Beta
Brought to you by:
metin-kaya
| File | Date | Author | Commit |
|---|---|---|---|
| cfg | 2013-07-25 |
|
[1866ca] Initial commit |
| gui | 2013-07-26 |
|
[e440e8] update revision |
| include | 2013-07-25 |
|
[1866ca] Initial commit |
| src | 2013-07-25 |
|
[1866ca] Initial commit |
| Makefile | 2013-07-26 |
|
[e440e8] update revision |
| README | 2013-07-26 |
|
[e86f9f] update revs. |
| compile_all.sh | 2013-07-25 |
|
[1866ca] Initial commit |
| fullrandom.config | 2013-07-25 |
|
[1866ca] Initial commit |
| fullstatic.config | 2013-07-25 |
|
[1866ca] Initial commit |
| randomip_staticport.config | 2013-07-25 |
|
[1866ca] Initial commit |
| staticip_randomport.config | 2013-07-25 |
|
[1866ca] Initial commit |
NetStress-3.0.7 README
---------------------------------------
-- Installation:
First, configure your installation:
# make menuconfig
Note that this command requires libncursesw5 installed on your system. If you don't want to use that way,
then just copy one of *.config (e.g., fullrandom.config if you want source IP/port be random) file as '.config'.
Then compile the codes:
# make
Now, netstress* (suffix depends on your configuration) binary can be executed.
-- Sample usages:
Please note that only root user can run NetStress.
Running netstress without a parameter cause it to print a help message:
$ sudo ./netstress_fullrandom
Metin KAYA <kayameti@gmail.com> from EnderUNIX SDT [http://www.EnderUNIX.org]
NETSTRESS a.k.a SALDIRAY v3.0.7
--saddr, -s: source address
--sport, -p: source port
--daddr, -d: destination address
--dport, -P: destination port
--file, -f: the full path for the file of dns server list for ampdns flood
--attack, -a: type of attack (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98,
get, post, syncook, isssyn)
--process, -n: number of processes
--buffer, -b: size of UDP packet
--dnsqname, -N: hostname which will be queried
--dnsqtype, -t: type of dns query (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt)
--useragent, -u: user agent parameter for http get flood
--help, -h: shows this message
It's an example SYN flood from source IP address 1.1.1.1 and port 8888 to destination IP address 2.2.2.2 and port 9999 just with 1 process:
$ sudo ./netstress_fullrandom -s 1.1.1.1 -p 8888 -d 2.2.2.2 -P 9999 -a syn -n 1
You don't need to specify source port if you compiled netstress with random source port feature. Same logic is valid for source IP and destination IP/port.
For Python interface: NetStress GUI depends on python-wx library.
$ cd gui
$ python netstress.py
EnderUNIX SDT @ Istanbul/Turkey
kayameti@gmail.com
http://www.enderunix.org
Thu Jul 25 14:08:08 EEST 2013