First, we use the most famous RedHat Linux for testing the configuration method of the client and server we use to attack. In this attack test, I use fedora core3, the software uses the most famous DDoS attack tool TFN2k Linux. The attacked Windows server system uses the apache2 ftp vnc enabled by windows2000server service, which is not closely related to Apache attacks.
Start to set up the server.
0. Decompress tar-zxvf TFN2k. tgz
1. Install TFN2k
TFN2k is open sourceCodeSo we need to compile the software. Needless to say, the compilation should all be done, but there are a few points that need to be noted, because different versions and vendors of Linux need different settings.
First modify src/IP. h
Comment out the following parts; otherwise, the compilation fails.
/* Struct in_addr
{
Unsigned long int s_addr;
};*/
Then make
During compilation, you will be prompted to enter the server side to set the password to 8-32 bits. (During attack, you need to enter the password.) After compilation, two new execution files (TD and TFN) will appear, TD is a daemon and a client user process. TFN is a server-controlled process. If you want to attack others, you must first start the TD process and then run the server process. Otherwise, the attack is invalid. You can change the password by executing mkpass. Finally, install and run TD on all clients (root permission required), and create a text file on the server, file to record all the Client IP addresses (it is feasible to edit one with VI), format:
192.168.0.1
192.168.0.2
192.168.0.3
IP
IP
.....
Then run./TFN on the master server.