behavior of thousands of HTTP/HTTPS and FTP/ftps client applications of hundreds of thousands of people, each with its own source IP address. On the contrary, other curl-loaders use the client protocol stack written in real C, that is, the HTTP and FTP protocol stacks of libcurl and TLS/OpenSSL SSL, supports logging in and verifying tastes and simulating user behavior.
IagoIago is a website load testing to
Reference to:http://www.freebuf.com/tools/50324.htmlFrom serious Heartbleed vulnerabilities to Apple's gotofail vulnerabilities, to the recent SSL V3 poodle vulnerabilities ... We have seen the huge disaster caused by the vulnerability of network traffic. So "valley Man" came! Google has recently developed a tool,--nogotofail, that can help developers detect security breaches in network traffic classes.Keep all networked devices protected from
-ddos-simulator/
5, R-u-dead-yet
R-u-dead-yet is an HTTP POST Dos attack tool. It executes a Dos attack long form field, which is submitted by post method. This tool provides an interactive console menu, detects a given URL, and allows users to choose which tables and fields to use for post-based Dos attacks.
Download: https://code.google.com/p/r-u-dead-yet/
6. Tor ' s Hammer
Tor ' Hammer is another good DO
DOS test tool. It's written in Python. This tool has an additional advantage: it can execute attacks via the Tor anonymous network. This is a very effective tool that can kill Apache and IIS servers in a matter of seconds.
Download Tor ' hummer:http://packetstormsecurity.com/files/98831/
7, Pyloris
It is said that Pyl
, Ddosim-layer
Ddosim is another popular Dos attack tool. As the name suggests, it is through simulation to control several zombie hosts to perform DDoS attacks. All zombie hosts create a full TCP connection to the target server.
This tool is written in C + + and runs on Linux systems.
These are the main features of Ddosim:
Simulate several zombie attacks
random IP address
tcp-connection-based attack
Applic
AB is a very useful test tool for Apache, and when you're done with Apache, you can find AB below the bin.
1 We can simulate 100 concurrent users, send 1000 requests to a page
./ab-n1000-c100 http://vm1.jianfeng.com/a.html
Where-n represents the number of requests,-C represents the number of concurrent
return Result:
# #首先是apache的版本信息This is Apachebench, Version 2.3 Copyright 1996 Adam Twiss, Zeu
Curl-loader IntroductionCurl-loader ( also known as "Omes-nik" and "Davilka") is an open source C language tool that simulates application load and tens of thousands of hundreds of thousands of of people with HTTP/ HTTPS and ftp/ FTPs The behavior of the client application, each with its own source IP address.Instead, the other curl-loader uses the real C-written client stack, the Libcurl and tls/ OpenSSL S
Network Scanning and sniffing tool Nmap in the penetration test tutorial of KailLinuxNetwork Scanning and sniffing tool Nmap Network scanning and sniffing tool-NmapNmap is a free and open Network scanning and sniffing tool. This tool
as ' apache=1234 '. (You can repeat settings)-H attribute to add any request header, for example. ' Accept-encoding:gzip ' (Repeatable settings)-A attribute to add basic WWW authentication information, which is a comma-separated username and password in English-P attribute to add Proxy server authentication information, use commas to separate user names and passwords-X proxy:port Specifies the address and port number of the proxy server-K uses the HTTP keepalive attribute-R do not exit when the
Hitchhiker is an open-source, Restful API testing tool that supports multiplayer collaboration, supports schedule, data comparison, stress testing, support for scripting requests, and can be easily deployed locally, collaborating with your team members to test the API.For more information, see: http://doc.hitchhiker-api.com/cn/introduction.htmlOnline experience: http://www.hitchhiker-api.com/, can be used t
Before learning the LoadRunner agreement, I think we need to understand the basic concept of the agreement. First of all, we know that the communication between computer and computer is inseparable from the communication protocol, and then we say the concept of communication protocol. What is a communication protocol, a communication protocol is actually a set of rules and conventions. In a way, two or more computers must agree on what to do when communicating, such as file transfer or email, an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.