NetStress-NG Code
NetStress is a DDoS and network stress testing tool.
Status: Beta
Brought to you by:
metin-kaya
File | Date | Author | Commit |
---|---|---|---|
cfg | 2013-07-25 |
![]() |
[1866ca] Initial commit |
gui | 2013-07-26 |
![]() |
[e440e8] update revision |
include | 2013-07-25 |
![]() |
[1866ca] Initial commit |
src | 2013-07-25 |
![]() |
[1866ca] Initial commit |
Makefile | 2013-07-26 |
![]() |
[e440e8] update revision |
README | 2013-07-26 |
![]() |
[e86f9f] update revs. |
compile_all.sh | 2013-07-25 |
![]() |
[1866ca] Initial commit |
fullrandom.config | 2013-07-25 |
![]() |
[1866ca] Initial commit |
fullstatic.config | 2013-07-25 |
![]() |
[1866ca] Initial commit |
randomip_staticport.config | 2013-07-25 |
![]() |
[1866ca] Initial commit |
staticip_randomport.config | 2013-07-25 |
![]() |
[1866ca] Initial commit |
NetStress-3.0.7 README --------------------------------------- -- Installation: First, configure your installation: # make menuconfig Note that this command requires libncursesw5 installed on your system. If you don't want to use that way, then just copy one of *.config (e.g., fullrandom.config if you want source IP/port be random) file as '.config'. Then compile the codes: # make Now, netstress* (suffix depends on your configuration) binary can be executed. -- Sample usages: Please note that only root user can run NetStress. Running netstress without a parameter cause it to print a help message: $ sudo ./netstress_fullrandom Metin KAYA <kayameti@gmail.com> from EnderUNIX SDT [http://www.EnderUNIX.org] NETSTRESS a.k.a SALDIRAY v3.0.7 --saddr, -s: source address --sport, -p: source port --daddr, -d: destination address --dport, -P: destination port --file, -f: the full path for the file of dns server list for ampdns flood --attack, -a: type of attack (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98, get, post, syncook, isssyn) --process, -n: number of processes --buffer, -b: size of UDP packet --dnsqname, -N: hostname which will be queried --dnsqtype, -t: type of dns query (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt) --useragent, -u: user agent parameter for http get flood --help, -h: shows this message It's an example SYN flood from source IP address 1.1.1.1 and port 8888 to destination IP address 2.2.2.2 and port 9999 just with 1 process: $ sudo ./netstress_fullrandom -s 1.1.1.1 -p 8888 -d 2.2.2.2 -P 9999 -a syn -n 1 You don't need to specify source port if you compiled netstress with random source port feature. Same logic is valid for source IP and destination IP/port. For Python interface: NetStress GUI depends on python-wx library. $ cd gui $ python netstress.py EnderUNIX SDT @ Istanbul/Turkey kayameti@gmail.com http://www.enderunix.org Thu Jul 25 14:08:08 EEST 2013