NetStress-NG Code
NetStress is a DDoS and network stress testing tool.
Status: Beta
                
                Brought to you by:
                
                    metin-kaya
                    
                
            | File | Date | Author | Commit | 
|---|---|---|---|
| cfg | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| gui | 2013-07-26 |  Metin KAYA | [e440e8] update revision | 
| include | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| src | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| Makefile | 2013-07-26 |  Metin KAYA | [e440e8] update revision | 
| README | 2013-07-26 |  Metin KAYA | [e86f9f] update revs. | 
| compile_all.sh | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| fullrandom.config | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| fullstatic.config | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| randomip_staticport.config | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
| staticip_randomport.config | 2013-07-25 |  Metin KAYA | [1866ca] Initial commit | 
        NetStress-3.0.7 README
    ---------------------------------------
-- Installation:
First, configure your installation:
# make menuconfig
Note that this command requires libncursesw5 installed on your system. If you don't want to use that way,
then just copy one of *.config (e.g., fullrandom.config if you want source IP/port be random) file as '.config'.
Then compile the codes:
# make
Now, netstress* (suffix depends on your configuration) binary can be executed.
-- Sample usages:
Please note that only root user can run NetStress.
Running netstress without a parameter cause it to print a help message:
$ sudo ./netstress_fullrandom
        Metin KAYA <kayameti@gmail.com> from EnderUNIX SDT [http://www.EnderUNIX.org]
            NETSTRESS a.k.a SALDIRAY v3.0.7
        --saddr,     -s:  source address
        --sport,     -p:  source port
        --daddr,     -d:  destination address
        --dport,     -P:  destination port
        --file,      -f:  the full path for the file of dns server list for ampdns flood
        --attack,    -a:  type of attack (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98,
                  get, post, syncook, isssyn)
        --process,   -n:  number of processes
        --buffer,    -b:  size of UDP packet
        --dnsqname,  -N:  hostname which will be queried
        --dnsqtype,  -t:  type of dns query (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt)
        --useragent, -u:  user agent parameter for http get flood
        --help,      -h:  shows this message
It's an example SYN flood from source IP address 1.1.1.1 and port 8888 to destination IP address 2.2.2.2 and port 9999 just with 1 process:
$ sudo ./netstress_fullrandom -s 1.1.1.1 -p 8888 -d 2.2.2.2 -P 9999 -a syn -n 1
You don't need to specify source port if you compiled netstress with random source port feature. Same logic is valid for source IP and destination IP/port.
For Python interface: NetStress GUI depends on python-wx library.
$ cd gui
$ python netstress.py
EnderUNIX SDT @ Istanbul/Turkey
kayameti@gmail.com
http://www.enderunix.org
Thu Jul 25 14:08:08 EEST 2013