Skip to content

Latest commit

 

History

History
127 lines (83 loc) · 3.72 KB

README.md

File metadata and controls

127 lines (83 loc) · 3.72 KB

Typing SVG


This script is a powerful tool to perform SYN flood attacks on specified target hosts within your local network. Leveraging hping3 for the flood attack and ipcalc to ensure target IPs are valid, it gives you a glimpse into the world of network testing.


🛠️ Prerequisites

Before running this script, ensure you have the following installed on your system:

  • hping3 📡
  • ipcalc 🔍

Install these tools using your package manager.

Linux (Ubuntu/Debian)

sudo apt-get install hping3 ipcalc

Windows

On Windows, you can use choco (Chocolatey package manager) to install hping3. ipcalc is not available directly via choco, but you can use other similar tools or install it manually via a Linux subsystem like WSL.

  1. Install Chocolatey (if not already installed):
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))
  1. Install hping:
choco install hping

For ipcalc, you might want to use a different approach or run it under WSL (Windows Subsystem for Linux).

macOS

Using Homebrew, the macOS package manager:

brew install hping ipcalc

If ipcalc is not available directly via Homebrew, you can install ipcalc-ng as an alternative:

brew install ipcalc-ng

🚀 Usage

  1. Clone the repository:
git clone https://github.com/B3TA-BLOCKER/IP-Flooder.git
  1. Navigate to the project directory:
cd IP-Flooder
  1. Make the script executable:
chmod +x main.sh
  1. Run the script:
sudo ./main.sh

💻 Script Details

Description

This script performs the following steps:

  1. Get Local Network Information 🌐:

    • Retrieves the local IP address and determines the subnet (assuming a /24 subnet).
  2. Prompt for Target Hosts 🎯:

    • Asks the user to enter the target IP addresses separated by spaces.
  3. Validate and Attack ⚔️:

    • For each entered IP address, the script checks if the IP is within the local subnet.
    • If the IP is valid, it initiates a SYN flood attack using hping3 and logs the output to a file named after the target IP.
    • If the IP is not within the local network, it notifies the user.
  4. Wait for Attacks to Complete ⏳:

    • The script waits for all initiated attacks to complete before exiting.

⚠️ Important Notes

  • Caution: SYN flood attacks can cause network disruptions and are considered malicious activity. Use this script responsibly and only in environments where you have explicit permission to perform such actions.
  • Permissions: The script uses sudo to run hping3. Ensure you have the necessary permissions to execute commands with sudo.
  • Logging: Each attack's output is logged to a file named after the target IP address, e.g., 192.168.1.1_attack.log.

📝 Disclaimer

This script is provided for educational purposes only. The author is not responsible for any misuse or damage caused by using this script.


🛡️ License

This project is licensed under the MIT License.


📞 Contact

For support or questions, feel free to reach out: