NetStress-NG is a network stress testing tool that allows users to simulate network traffic and measure the performance and stability of their network infrastructure. It is an upgraded version of the original NetStress tool, with added features and improvements.
NetStress-NG can generate various types of network traffic, including TCP, UDP, and ICMP packets, and allows users to customize traffic parameters such as packet size, bandwidth, and latency. This enables users to simulate real network conditions and test the capacity and resilience of their network.
The tool provides detailed statistics and charts for analyzing network performance, including throughput, latency, and packet loss. It also offers advanced features such as multi-threading, allowing users to generate a large amount of traffic and stress test their network.
NetStress-NG is a versatile tool that can be used for network benchmarking, troubleshooting, and capacity planning, among other purposes. It is commonly used by network administrators, IT professionals, and network equipment manufacturers to evaluate the performance and reliability of their network infrastructure.
Overall, NetStress-NG is a powerful network stress testing tool that provides users with the ability to simulate and measure network traffic, helping them identify and resolve any performance or stability issues in their network.
SF download link: http://sourceforge.net/projects/netstressng/
NetStress supports the following attack methods:
SYN Flood Attacks
-
SYN flood static source port
-
SYN flood random source port
-
SYN flood static source IP
-
SYN flood random source IP
-
SYN flood fragmented packets
ACK Flood Attacks
-
ACK flood static source port
-
ACK flood random source port
-
ACK flood static source IP
-
ACK flood random source IP
-
ACK flood fragmented packets
FIN Flood Attacks
-
FIN flood static source port
-
FIN flood random source port
-
FIN flood static source IP
-
FIN flood random source IP
-
FIN flood fragmented packets
UDP Flood Attacks
-
UDP flood static source port
-
UDP flood random source port
-
UDP flood static source address
-
UDP flood random source address
-
UDP flood fragmented packets
ICMP Flood
- ICMP flood random all options (source address, ICMP type, code)
HTTP Flood
-
Stateless GET Flood
-
Stateless POST Flood
-
GET Flood with forged headers
-
POST Flood with forged headers
Random Flood Attacks
-
SYN+UDP+GET Flood
-
ICMP+UDP
-
UDP+PUSH Flood
-
UDP+ICMP Flood
DNS Flood Attacks
-
DNS flood static source IP
-
DNS flood static spoofed address
-
DNS flood random IP address
-
DNS amplification attack
Zombie Network Simulation
-
Sending packets from a subnet similar to 88.x.x.x
-
Rate limiting functionality testing
-
State packet detection testing
-
Rate limiting functionality based on country deception attacks
-
UDP, SYN, ACK, FIN, ICMP... using known country IP blocks as source IP addresses for Flood Attacks
It has a Python interface and can also be executed from the command line.
Command parameters:
--saddr, -s: Source address
--sport, -p: Source port
--daddr, -d: Destination address
--dport, -P: Destination port
--file, -f: Full path to file for ampdns flood of DNS server list
--attack, -a: Attack type (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98, get, post, syncook, isssyn)
--process, -n: Number of processes
--buffer, -b: UDP packet size
--dnsqname, -N: DNS query name
--dnsqtype, -t: DNS query type (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt)
--useragent, -u: UserAgent parameter for HTTP GET flood
--help, -h: Show help
DNS attack command
./netstress.fullrandom -d 192.168.100.100 -P 53 -a dns -n 1 -t a#
SYN attack command
./netstress.fullrandom -d 192.168.100.100 -P 80 -a syn -n 1#
Http Get attack command
./netstress.fullrandom -d 192.168.100.100 -P 80 -a get -n 1 -u test#
"Warning: This tool is intended for learning and legal purposes only. Using NetStress-NG for unauthorized network stress testing or attacks is illegal and a serious violation of laws and ethical guidelines. Please ensure that you comply with applicable laws and regulations and obtain the necessary authorization when using NetStress-NG. Any unauthorized network activity may result in severe legal consequences.
NetStress-NG is a tool for evaluating network performance and stability and should be used in a lawful environment. Please ensure that you only use this tool on network devices for which you have legal authorization and comply with the laws and regulations of your jurisdiction. Any misuse or illegal use of NetStress-NG will be the sole responsibility of the user.
We strongly urge users to comply with laws and ethical standards to ensure network security and lawful use. If you have any questions or need further guidance, please consult relevant legal professionals or network security experts."