banner
andrewji8

Being towards death

Heed not to the tree-rustling and leaf-lashing rain, Why not stroll along, whistle and sing under its rein. Lighter and better suited than horses are straw sandals and a bamboo staff, Who's afraid? A palm-leaf plaited cape provides enough to misty weather in life sustain. A thorny spring breeze sobers up the spirit, I feel a slight chill, The setting sun over the mountain offers greetings still. Looking back over the bleak passage survived, The return in time Shall not be affected by windswept rain or shine.
telegram
twitter
github

NetStress-NG DDOS Stress Test

NetStress-NG is a network stress testing tool that allows users to simulate network traffic and measure the performance and stability of their network infrastructure. It is an upgraded version of the original NetStress tool, with added features and improvements.

NetStress-NG can generate various types of network traffic, including TCP, UDP, and ICMP packets, and allows users to customize traffic parameters such as packet size, bandwidth, and latency. This enables users to simulate real network conditions and test the capacity and resilience of their network.

The tool provides detailed statistics and charts for analyzing network performance, including throughput, latency, and packet loss. It also offers advanced features such as multi-threading, allowing users to generate a large amount of traffic and stress test their network.

NetStress-NG is a versatile tool that can be used for network benchmarking, troubleshooting, and capacity planning, among other purposes. It is commonly used by network administrators, IT professionals, and network equipment manufacturers to evaluate the performance and reliability of their network infrastructure.

In summary, NetStress-NG is a powerful network stress testing tool that provides users with the ability to simulate and measure network traffic, helping them identify and resolve any performance or stability issues in their network.

SF download link: http://sourceforge.net/projects/netstressng/

NetStress supports the following attack methods:

SYN Flood Attacks

  • SYN flood with static source port
  • SYN flood with random source port
  • SYN flood with static source IP
  • SYN flood with random source IP
  • SYN flood with fragmented packets

ACK Flood Attacks

  • ACK flood with static source port
  • ACK flood with random source port
  • ACK flood with static source IP
  • ACK flood with random source IP
  • ACK flood with fragmented packets

FIN Flood Attacks

  • FIN flood with static source port
  • FIN flood with random source port
  • FIN flood with static source IP
  • FIN flood with random source IP
  • FIN flood with fragmented packets

UDP Flood Attacks

  • UDP flood with static source port
  • UDP flood with random source port
  • UDP flood with static source address
  • UDP flood with random source address
  • UDP flood with fragmented packets

ICMP Flood

  • ICMP flood with random options (source address, ICMP type, code)

HTTP Flood

  • Stateless GET flood
  • Stateless POST flood
  • GET flood with forged headers
  • POST flood with forged headers

Random Flood Attacks

  • SYN+UDP+GET flood
  • ICMP+UDP
  • UDP+PUSH flood
  • UDP+ICMP flood

DNS Flood Attacks

  • DNS flood with static source IP
  • DNS flood with static spoofed address
  • DNS flood with random IP addresses
  • DNS amplification attack

Zombie Network Simulation

  • Sending packets from a subnet similar to 88.x.x.x
  • Bandwidth throttling test
  • State packet detection test
  • Rate limiting based on deception attacks
  • Flood attacks using known country IP blocks as source IP addresses (UDP, SYN, ACK, FIN, ICMP)

It has a Python interface and can also be executed from the command line.

Command parameters:

  • --saddr, -s: source address
  • --sport, -p: source port
  • --daddr, -d: destination address
  • --dport, -P: destination port
  • --file, -f: full path of the file for ampdns flood on DNS server list
  • --attack, -a: attack type (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98, get, post, syncook, isssyn)
  • --process, -n: number of processes
  • --buffer, -b: UDP packet size
  • --dnsqname, -N: DNS query name
  • --dnsqtype, -t: DNS query type (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt)
  • --useragent, -u: UserAgent parameter for HTTP GET flood
  • --help, -h: display help

DNS attack command:

./netstress.fullrandom -d 192.168.100.100 -P 53 -a dns -n 1 -t a#

SYN attack command:

./netstress.fullrandom -d 192.168.100.100 -P 80 -a syn -n 1#

HTTP GET attack command:

./netstress.fullrandom -d 192.168.100.100 -P 80 -a get -n 1 -u test#

"Warning: This tool is intended for learning and legitimate purposes only. Using NetStress-NG for unauthorized network stress testing or attacks is illegal and a serious violation of laws and ethical guidelines. Please ensure that you comply with applicable laws and regulations and obtain the necessary authorization when using NetStress-NG. Any unauthorized network activity may result in severe legal consequences.

NetStress-NG is a tool for evaluating network performance and stability and should be used in a lawful environment. Please ensure that you only use this tool on network devices for which you have legal authorization and comply with the laws and regulations of your jurisdiction. The consequences of any misuse or illegal use of NetStress-NG will be the sole responsibility of the user.

We strongly urge users to comply with laws and ethical standards to ensure network security and lawful use. If you have any questions or need further guidance, please consult relevant legal professionals or network security experts."

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.