Nmap Development mailing list archives

Re: Using Nmap as a Network Stress Testing Tool


From: Professor 0110 <professor0110 () gmail com>
Date: Sun, 15 Mar 2009 11:11:37 +1000

Thanks Kris!
So, as soon as I update Metasploit, I should be able to use this? Will it
work on Windows Vista? Because Raw IP has been removed ever since Windows XP
SP2.

On Sun, Mar 15, 2009 at 10:30 AM, Kris Katterjohn <katterjohn () gmail com>wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Professor 0110 wrote:
Well, I think that functionality should be built into Nmap allowing it to
be
utilized for network stress testing upon demand. I mean its a great
network
tool and you can already do many cool things with it, but if network
stress
testing such as SYN/UDP Flooding capabilities are built it, it would make
the ULTIMATE network tool.
Netcat's already integrated, so why not a tool called Nflood?


I know you're a Metasploit user, so you may be interested in the (simple)
SYN
flooder I committed yesterday:


http://trac.metasploit.com/browser/framework3/trunk/modules/auxiliary/dos/tcp/synflood.rb?rev=head

Lemme know if you have any problems with it.  I completely killed the HTTP
server running on one of my (apparently badly designed) routers with it :)

Cheers,
Kris Katterjohn

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQIcBAEBAgAGBQJJvEwlAAoJEEQxgFs5kUfulB8P/iG6lQz063i29totJF//0x9y
Hp4temIMdLJKvGu0gdRQbPNQXj1XA9PZ0mx1Zt+66/DM7kFlEJ/OQsRvW1FLFNFF
zF7ffZQM17yJDxpN13S4lHY4eY/g1vWjIXtwWSe6KJ9R2ejyxEFYBy/EBa9KWhBr
xZk2sDgrdvm7rxY08408RAwQAZlmU+851lac0XTwpo6yJ/1uQ1lko9OC9PDUk4yF
TWUTDBUql69/Jtn7ZjFmNZXKQ1S7hzzY9+Kc383jo+d75Vg7Y8rU+PN/pRla+pmI
t7JBBZxAc3CU+vG18oICwUIW0eNj/1WOmJuMkp42HPRY/GUZ/0aYDWpC1w/0thyI
exWTr4inESTAC5WPvDah0Xm47B2TE9hnIH9okbyeKaQEtoxLQRHWSGYcrEJFiQMV
eKjN9Ivwo0hZmGUH4Qp+FUtw555j59vnYIh4baYSitIBMwP/uSkYnFmuQBAIrbIv
Gqa3mW+I51oTnG7mKoCJprjs9/WnIg0zdYn0dzRfKEucpwQsa+HJjtz1qlHsylW2
K/OJMeNpDHNhSp71I97HrBaFrA7B+hNXBJVU4asFTtp2tsDflU+PVekFJU+u+7B7
OQFwdyqXWcUUmbWV2DLgeUe/qKmYA9FwQizjgKTY6IrmhRsqFmP8I6tiUizZfo3r
vneJ+oKRMlbbMctK4sBS
=1GFM
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: