G
G
grfx32015-04-02 09:04:39
Iron
grfx3, 2015-04-02 09:04:39

How to simulate DDOS on one machine?

I want to simulate a large network (65k ip). One machine with desktop performance is available. There is no need to emulate the physical characteristics of machines. All that is needed is the ability to send different data from different ip addresses of the local machine to one specific ip of the same machine (there is also no need to monitor the load, which is typical for the usual simulation of a ddos ​​attack).
Where to look, what to look for?

Answer the question

In order to leave comments, you need to log in

5 answer(s)
S
Sergey Petrikov, 2015-04-02
@RicoX

The easiest way is to use special tools like hping with the --rand-source option

D
Disen, 2015-04-02
@Disen

In general, emulating the work of 65k machines on one physical machine is quite an unusual task.
How about using hping3 in flood mode with the --rand-source option?
For example, something like this:
hping3 -c 10000 -S -p 22 --flood --rand-source ip-addr
We flood the target host with SYN packets on port 22 with tcp packets with random sources in flood mode, the host with the address ip- addr

V
Valentin, 2015-04-02
@vvpoloskin

So no DDoS simulation will work like that.
But here are your options:
1) secondary ip - many addresses on one interface
2) virtual machines, although you are unlikely to raise 65k virtual machines
3) programs and frameworks for manipulating packets in which you can change headers. Example - scapy

V
Vitaly Pukhov, 2015-04-02
@Neuroware

Purely theoretically, this link has an example of creating a custom tcp package, theoretically it would be possible to emulate several interfaces (an infinite number in theory) and send packets from them, but I’m not sure whether this will work in practice.

A
Anton, 2015-12-17
Semenov

Not exactly, but you can, for example, use the built-in apache tool from the console
ab -n 1000 -c 100 yourweb.ru/
read man ab
Well, then according to the results.
But in fact, father-in-law can only fight off a real attack by studying and understanding traffic patterns, and then your skill in setting up iptables or a firewall on the server.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question