lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=fLDhBsQWKRUMmJvnpBN+6ciuH9Dvn0hzM8B4n@mail.gmail.com>
Date: Fri, 5 Nov 2010 15:30:29 +0200
From: Adrian Furtuna <adif2k8@...il.com>
To: full-disclosure@...ts.grok.org.uk, pen-test@...urityfocus.com
Subject: New version of ddosim - DDOS simulator

Dear All,

I am pleased to present the new version of *ddosim* (v0.2) - the application
layer DDOS simulator.

Description
========
DDOSIM simulates several zombie hosts (having random IP addresses) which
create full TCP connections to the target server. After completing the
connection, DDOSIM starts the conversation with the listening application
(e.g. HTTP server). Can be used only in a laboratory environment to test the
capacity of the target server to handle application specific DDOS attacks.

Features
======
   - HTTP DDoS with valid requests
   - HTTP DDoS with invalid requests (similar to a DC++ attack)
   - SMTP DDoS
   - TCP connection flood on random port

Download
=======
http://sourceforge.net/projects/ddosim/

Documentation
===========
http://stormsecurity.wordpress.com/2009/03/03/application-layer-ddos-simulator/

Contact
======
Adrian Furtuna <adif2k8 @ gmail.com>


Enjoy!

Adrian

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ