M
M
mikrotadmin2021-02-08 11:21:22
Mikrotik
mikrotadmin, 2021-02-08 11:21:22

How to check a site for resistance to DDOS using Mikrotik?

Is it possible to carry out a ddos ​​attack on your server/site with the help of 1-2 microns in order to check the hosting for resistance to this type of attack? Is there such a toolkit in devices from mikrotik?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
P
poisons, 2021-02-08
@poisons

/tool ​​traffic-
generator this way you can only check the hoster's channel for your site.

V
Vladimir Korotenko, 2021-02-08
@firedragon

Use Apache jmeter specifically designed for this. You can even write a script for a typical user and run it from 0 to a certain number of threads. Check exactly the stability of the application logic and not just the fouling of the channel.

D
Dmitry, 2021-02-08
@dtmse

It would be better to describe the task in more detail. DDOS also comes in different types and powers.
It is possible to “fill” the channel to the server with “garbage” traffic, so that there will simply not be an unoccupied bandwidth for the useful one. In principle, it is possible to arrange such a check using a device on RouterOS, but in practice it will be problematic if the site is hosted by any decent hoster (the hoster's channels are usually very "thick", and there may well be smart firewalls or some kind of Anti -DDOS, which will block such traffic, so that it simply stops reaching the server).
It is possible to create a load directly on the site by generating so many http requests that the site cannot handle. Mikrotik is unlikely to help here (of course, there is a /tool ​​fetch command and scripts, but I don’t think this is a suitable tool for solving the problem).
And DDOS is, by definition, an attack from many ip-addresses, and from 1-2 Mikrotiks it cannot be fully imitated even in a particular case.
And in general, if you create significant interference with the work of the host, then theoretically you can get into trouble, up to proceedings with the competent authorities. For the creation of interference with the operation of information systems is an article of the Criminal Code.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question