This script is a powerful tool to perform SYN flood attacks on specified target hosts within your local network. Leveraging hping3
for the flood attack and ipcalc
to ensure target IPs are valid, it gives you a glimpse into the world of network testing.
Before running this script, ensure you have the following installed on your system:
hping3
📡ipcalc
🔍
Install these tools using your package manager.
sudo apt-get install hping3 ipcalc
On Windows, you can use choco
(Chocolatey package manager) to install hping3
. ipcalc
is not available directly via choco
, but you can use other similar tools or install it manually via a Linux subsystem like WSL.
- Install Chocolatey (if not already installed):
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))
- Install hping:
choco install hping
For ipcalc
, you might want to use a different approach or run it under WSL (Windows Subsystem for Linux).
Using Homebrew, the macOS package manager:
brew install hping ipcalc
If ipcalc
is not available directly via Homebrew, you can install ipcalc-ng
as an alternative:
brew install ipcalc-ng
- Clone the repository:
git clone https://github.com/B3TA-BLOCKER/IP-Flooder.git
- Navigate to the project directory:
cd IP-Flooder
- Make the script executable:
chmod +x main.sh
- Run the script:
sudo ./main.sh
This script performs the following steps:
-
Get Local Network Information 🌐:
- Retrieves the local IP address and determines the subnet (assuming a /24 subnet).
-
Prompt for Target Hosts 🎯:
- Asks the user to enter the target IP addresses separated by spaces.
-
Validate and Attack ⚔️:
- For each entered IP address, the script checks if the IP is within the local subnet.
- If the IP is valid, it initiates a SYN flood attack using
hping3
and logs the output to a file named after the target IP. - If the IP is not within the local network, it notifies the user.
-
Wait for Attacks to Complete ⏳:
- The script waits for all initiated attacks to complete before exiting.
- Caution: SYN flood attacks can cause network disruptions and are considered malicious activity. Use this script responsibly and only in environments where you have explicit permission to perform such actions.
- Permissions: The script uses
sudo
to runhping3
. Ensure you have the necessary permissions to execute commands withsudo
. - Logging: Each attack's output is logged to a file named after the target IP address, e.g.,
192.168.1.1_attack.log
.
This script is provided for educational purposes only. The author is not responsible for any misuse or damage caused by using this script.
This project is licensed under the MIT License.
For support or questions, feel free to reach out:
- GitHub Profile: B3TA-BLOCKER
- Email: [email protected]