Skip to content

Internet Security tool that can stress test a site, programmed in Python. This tool uses keep-alive DoS to do that.

License

Notifications You must be signed in to change notification settings

460N1/IS_Stress-Test

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Internet Security - Stress Testing DoS Tool

This was a task in Internet Security for creating a tool which allows site stress testing.

You can do anything you want with these files, but MIT license applies.

RawCap.exe has other use conditions (https://www.netresec.com/?page=RawCap).

usage: ISStress.py [-h] [-p PORT] [-s SOCKETS] [-d] [-r] [-q] [--https] [host]

  host                              Host which we will stress test.
  -h, --help                        Shows these instructions.
  -p PORT, --port PORT              Target port (default 80).
  -s SOCKETS, --sockets SOCKETS     Number of sockets to be used (default 100).
  
  -d, --detaje                      Shows more information during execution (verbose).
  -q, --qete                        Doesn't show anything during execution.
  -r, --random-ua                   Uses random user-agent.
  --https                           Uses HTTPS for requests.


Included is also a .bat file which will start the attack, and start packet capture at the same time. It also opens the packet capture (.pcap) file as soon as packet capture ends.

Everything can be edited. In the batch file, getintopc.com is the target, you can replace it with any site you want, and add arguments based on the usage of ISStress.py above.

Special attention must be paid to RawCap.exe. In the batch script, the number 4 represents the interface which was used during development.

For you, this will probably be different. To know which number you should use, just execute RawCap.exe and remember the number of the interface you wish to use, and replace it in the batch file.


If this file is spread among other hosts, edited a little bit and executed at the same time, it can simulate a DDoS attack. That's not something I recommend doing, just thinking out loud.