This is as simple test utility that allows system administrators test their system under DoS attack.
Sockstress uses raw sockets, so you must run the tool as root. You must also stop your OS from sending RST packets to the victim in response to unrecognized SYN/ACKs sent during the attack. To do so, set an iptables rule:
# iptables -A OUTPUT -p TCP --tcp-flags rst rst -d xx.xx.xx.xx -j DROP
Where xx.xx.xx.xx is the victim's IP address.
Search Criteria
Package Details: sockstress-util 1.0-2
Package Actions
| Package Base: | sockstress-util |
|---|---|
| Description: | C++ utility used to attack servers on the Internet and other networks utilizing TCP protocol pecularities. |
| Upstream URL: | https://defuse.ca/sockstress.htm |
| Category: | network |
| Licenses: | |
| Submitter: | Argenet |
| Maintainer: | Argenet |
| Last Packager: | None |
| Votes: | 2 |
| First Submitted: | 2012-07-05 14:25 |
| Last Updated: | 2012-07-05 16:36 |