banner
andrewji8

Being towards death

Heed not to the tree-rustling and leaf-lashing rain, Why not stroll along, whistle and sing under its rein. Lighter and better suited than horses are straw sandals and a bamboo staff, Who's afraid? A palm-leaf plaited cape provides enough to misty weather in life sustain. A thorny spring breeze sobers up the spirit, I feel a slight chill, The setting sun over the mountain offers greetings still. Looking back over the bleak passage survived, The return in time Shall not be affected by windswept rain or shine.
telegram
twitter
github

NetStress-NG DDOS Stress Test

NetStress-NG is a network stress testing tool that allows users to simulate network traffic and measure the performance and stability of their network infrastructure. It is an upgraded version of the original NetStress tool, with added features and improvements.

NetStress-NG can generate various types of network traffic, including TCP, UDP, and ICMP packets, and allows users to customize traffic parameters such as packet size, bandwidth, and latency. This enables users to simulate real network conditions and test the capacity and resilience of their network.

The tool provides detailed statistics and charts for analyzing network performance, including throughput, latency, and packet loss. It also offers advanced features such as multi-threading, allowing users to generate a large amount of traffic and stress test their network.

NetStress-NG is a versatile tool that can be used for network benchmarking, troubleshooting, and capacity planning, among other purposes. It is commonly used by network administrators, IT professionals, and network equipment manufacturers to evaluate the performance and reliability of their network infrastructure.

Overall, NetStress-NG is a powerful network stress testing tool that provides users with the ability to simulate and measure network traffic, helping them identify and resolve any performance or stability issues in their network.

image

SF download link: http://sourceforge.net/projects/netstressng/

NetStress supports the following attack methods:

SYN Flood Attacks

  • SYN flood static source port

  • SYN flood random source port

  • SYN flood static source IP

  • SYN flood random source IP

  • SYN flood fragmented packets

ACK Flood Attacks

  • ACK flood static source port

  • ACK flood random source port

  • ACK flood static source IP

  • ACK flood random source IP

  • ACK flood fragmented packets

FIN Flood Attacks

  • FIN flood static source port

  • FIN flood random source port

  • FIN flood static source IP

  • FIN flood random source IP

  • FIN flood fragmented packets

UDP Flood Attacks

  • UDP flood static source port

  • UDP flood random source port

  • UDP flood static source address

  • UDP flood random source address

  • UDP flood fragmented packets

ICMP Flood

  • ICMP flood random all options (source address, ICMP type, code)

HTTP Flood

  • Stateless GET Flood

  • Stateless POST Flood

  • GET Flood with forged headers

  • POST Flood with forged headers

Random Flood Attacks

  • SYN+UDP+GET Flood

  • ICMP+UDP

  • UDP+PUSH Flood

  • UDP+ICMP Flood

DNS Flood Attacks

  • DNS flood static source IP

  • DNS flood static spoofed address

  • DNS flood random IP address

  • DNS amplification attack

Zombie Network Simulation

  • Sending packets from a subnet similar to 88.x.x.x

  • Rate limiting functionality testing

  • State packet detection testing

  • Rate limiting functionality based on country deception attacks

  • UDP, SYN, ACK, FIN, ICMP... using known country IP blocks as source IP addresses for Flood Attacks

It has a Python interface and can also be executed from the command line.

Command parameters:

--saddr, -s: Source address

--sport, -p: Source port

--daddr, -d: Destination address

--dport, -P: Destination port

--file, -f: Full path to file for ampdns flood of DNS server list

--attack, -a: Attack type (ack, syn, fin, udp, dns, ampdns, igmp, winbomb, win98, get, post, syncook, isssyn)

--process, -n: Number of processes

--buffer, -b: UDP packet size

--dnsqname, -N: DNS query name

--dnsqtype, -t: DNS query type (a, ns, cname, soa, wks, ptr, hinfo, minfo, mx, txt)

--useragent, -u: UserAgent parameter for HTTP GET flood

--help, -h: Show help

DNS attack command

./netstress.fullrandom -d 192.168.100.100 -P 53 -a dns -n 1 -t a#

SYN attack command

./netstress.fullrandom -d 192.168.100.100 -P 80 -a syn -n 1#

Http Get attack command

./netstress.fullrandom -d 192.168.100.100 -P 80 -a get -n 1 -u test#

"Warning: This tool is intended for learning and legal purposes only. Using NetStress-NG for unauthorized network stress testing or attacks is illegal and a serious violation of laws and ethical guidelines. Please ensure that you comply with applicable laws and regulations and obtain the necessary authorization when using NetStress-NG. Any unauthorized network activity may result in severe legal consequences.

NetStress-NG is a tool for evaluating network performance and stability and should be used in a lawful environment. Please ensure that you only use this tool on network devices for which you have legal authorization and comply with the laws and regulations of your jurisdiction. Any misuse or illegal use of NetStress-NG will be the sole responsibility of the user.

We strongly urge users to comply with laws and ethical standards to ensure network security and lawful use. If you have any questions or need further guidance, please consult relevant legal professionals or network security experts."

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.