Skip to content

This repo contains a Bash script to perform SYN flood attacks on local network hosts using hping3 and ipcalc. Perfect for network testing and education.

License

Notifications You must be signed in to change notification settings

B3TA-BLOCKER/IP-Flooder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 

Repository files navigation

Typing SVG


This script is a powerful tool to perform SYN flood attacks on specified target hosts within your local network. Leveraging hping3 for the flood attack and ipcalc to ensure target IPs are valid, it gives you a glimpse into the world of network testing.


🛠️ Prerequisites

Before running this script, ensure you have the following installed on your system:

  • hping3 📡
  • ipcalc 🔍

Install these tools using your package manager.

Linux (Ubuntu/Debian)

sudo apt-get install hping3 ipcalc

Windows

On Windows, you can use choco (Chocolatey package manager) to install hping3. ipcalc is not available directly via choco, but you can use other similar tools or install it manually via a Linux subsystem like WSL.

  1. Install Chocolatey (if not already installed):
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))
  1. Install hping:
choco install hping

For ipcalc, you might want to use a different approach or run it under WSL (Windows Subsystem for Linux).

macOS

Using Homebrew, the macOS package manager:

brew install hping ipcalc

If ipcalc is not available directly via Homebrew, you can install ipcalc-ng as an alternative:

brew install ipcalc-ng

🚀 Usage

  1. Clone the repository:
git clone https://github.com/B3TA-BLOCKER/IP-Flooder.git
  1. Navigate to the project directory:
cd IP-Flooder
  1. Make the script executable:
chmod +x main.sh
  1. Run the script:
sudo ./main.sh

💻 Script Details

Description

This script performs the following steps:

  1. Get Local Network Information 🌐:

    • Retrieves the local IP address and determines the subnet (assuming a /24 subnet).
  2. Prompt for Target Hosts 🎯:

    • Asks the user to enter the target IP addresses separated by spaces.
  3. Validate and Attack ⚔️:

    • For each entered IP address, the script checks if the IP is within the local subnet.
    • If the IP is valid, it initiates a SYN flood attack using hping3 and logs the output to a file named after the target IP.
    • If the IP is not within the local network, it notifies the user.
  4. Wait for Attacks to Complete ⏳:

    • The script waits for all initiated attacks to complete before exiting.

⚠️ Important Notes

  • Caution: SYN flood attacks can cause network disruptions and are considered malicious activity. Use this script responsibly and only in environments where you have explicit permission to perform such actions.
  • Permissions: The script uses sudo to run hping3. Ensure you have the necessary permissions to execute commands with sudo.
  • Logging: Each attack's output is logged to a file named after the target IP address, e.g., 192.168.1.1_attack.log.

📝 Disclaimer

This script is provided for educational purposes only. The author is not responsible for any misuse or damage caused by using this script.


🛡️ License

This project is licensed under the MIT License.


📞 Contact

For support or questions, feel free to reach out:


About

This repo contains a Bash script to perform SYN flood attacks on local network hosts using hping3 and ipcalc. Perfect for network testing and education.

Topics

Resources

License

Stars

Watchers

Forks

Languages