All Projects → rootVIII → gosynflood

rootVIII / gosynflood

Licence: MIT license
Demonstrates a synflood DDOS attack with raw sockets (for Ubuntu and Debian-like distros)

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to gosynflood

STUP-Protocol
Secure/Speedup TCP-like UDP protocol
Stars: ✭ 12 (-86.36%)
Mutual labels:  tcp, tcpip
overload
📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+89.77%)
Mutual labels:  ddos, tcp
ComputerNetworks-unipd2018
Tips and resources to easily pass the "Computer Networks" practical exam ("Reti di calcolatori") in Padua
Stars: ✭ 21 (-76.14%)
Mutual labels:  tcp, tcpip
DDoS-Script
A script written in perl for ddos ​​with automatic detection of open and vulnerable port that gives up to 1.5 gb packages / s
Stars: ✭ 30 (-65.91%)
Mutual labels:  ddos, tcp
Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (+35.23%)
Mutual labels:  ddos, tcp
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+511.36%)
Mutual labels:  ddos, tcp
ddos
Simple dos attack utility
Stars: ✭ 36 (-59.09%)
Mutual labels:  ddos, tcp
Ddos Rootsec
DDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (+22.73%)
Mutual labels:  ddos, tcp
computer-networks
computer networks on docker @ fmi.unibuc.ro
Stars: ✭ 72 (-18.18%)
Mutual labels:  packet-crafting
AndroidNetMonitor
This project aims to collect and analyze traffic information of Android.(采集手机发送和接收的报文简要信息,并且根据socket记录每个报文对应哪个手机app)
Stars: ✭ 25 (-71.59%)
Mutual labels:  tcp
NLog
Flexible logging for C# and Unity
Stars: ✭ 158 (+79.55%)
Mutual labels:  tcp
Modbus-STM32-HAL-FreeRTOS
Modbus TCP and RTU, Master and Slave for STM32 using Cube HAL and FreeRTOS
Stars: ✭ 272 (+209.09%)
Mutual labels:  tcp
XAsyncSockets
XAsyncSockets is an efficient Python/MicroPython library of managed asynchronous sockets.
Stars: ✭ 28 (-68.18%)
Mutual labels:  tcp
network exporter
ICMP & MTR & TCP Port & HTTP Get - Network Prometheus exporter
Stars: ✭ 162 (+84.09%)
Mutual labels:  tcp
condor
A minimal library for building scalable TCP servers in Erlang
Stars: ✭ 75 (-14.77%)
Mutual labels:  tcp
quebec-power-grid-talk
🎭 Quebec's 735kv power lines can survive the apocalypse, but can they run TCP?!
Stars: ✭ 31 (-64.77%)
Mutual labels:  tcp
gnb udp over tcp
gnb_udp_over_tcp 是一个为GNB开发的通过tcp链路中转UDP分组转发的服务
Stars: ✭ 32 (-63.64%)
Mutual labels:  tcp
dperf
dperf is a DPDK based 100Gbps network performance and load testing software.
Stars: ✭ 1,320 (+1400%)
Mutual labels:  tcp
ns2 bbr
Google's TCP BBR implementation for ns2 network simulator
Stars: ✭ 19 (-78.41%)
Mutual labels:  tcp
mqtt
The fully compliant, embeddable high-performance Go MQTT v5 server for IoT, smarthome, and pubsub
Stars: ✭ 356 (+304.55%)
Mutual labels:  tcp

gosynflood - Repeatedly Send Crafted TCP SYN Packets with Raw Sockets

intended for Ubuntu and other Debian distributions
USAGE:
  
# Clone project:
git clone https://github.com/rootVIII/gosynflood.git

# Build and run:
cd <project root>
go build -o bin/gosynflood

# raw sockets require root privileges when executing:
sudo ./bin/gosynflood  -t <target IPV4 address> -p <port number> -i <network interface>

# Example:
sudo ./bin/gosynflood  -t 192.168.1.120 -p 80 -i wlp3s0
  
CLI OPTIONS:
  
-t private or public IP address of target webserver
-p target webserver's port number (defaults to port 80 if not provided)
-i your network interface (running without -i will fail,
     but it will suggest all found interfaces, ie: lo, wlpxxx, eth0 etc.)

Enter control-c to stop the flood attack.
  

Each packet's IP address is spoofed. MAC addresses are not spoofed. It is up to you to spoof your MAC Address beforehand if desired.

This attack may only work on web servers susceptible to numerous half-open connections (SYN_RECV).

To demonstrate this, a small Ubuntu Mate running Apache2 will act as the target. It's a physical machine on a private network.


1. The tcp_syncookies flag was set to 0 (to make the target vulnerable for demonstration purposes) and the webserver was started on the target:

  1. The attacker machine (a separate physical machine also running Ubuntu) executes the gosynflood exe with root privileges:

  1. The initial SYNs are visible in Wireshark on the target, purposefully never completing the thee 3-way handshake:

  1. During the attack the webserver should be unreachable at it's URL if it is susceptible. The half-open connections are visible via the command netstat -na --tcp

This was developed on Ubuntu 18.04 LTS.


Author: rootVIII 2020

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].