Skip to content

hsnbskn/DragonDOS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DragonDOS & IP Spoof Tool

Author = "Hasan Baskın"

IP Spoofing

IP spoofing refers to the process of creating and sending an IP packet for a certain destination using a different source address, then the actual source IP address. Spoofing the source IP address can be possibly used for,

  1. the purpose of concealing the identity of the sender or
  2. impersonating another computing system (misleading the destination)
  3. defeating network security measures, such as authentication based on IP addresses

Implemented attacks(mostly on Internet Protocol):

  1. Denial Of Service attack (DOS attack) Goal : To flood the victim with overwhelming amounts of traffic, without considering the responses to the attack packets. Prerequisites : No service/response is expected from the targeted machine, thus it makes up to the most basic form of attack. Strategy : Saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered essentially unavailable (Server overload). Consequence : Makes the network resource unavailable to its intended users. Forces the targeted computer(s) to reset, or consume its resources so that it can no longer provide its intended service Obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately

Screenshots of Script

Image

Installation

$ sudo apt-get install git
$ git clone https://github.com/G4LD0R/DragonDOS.git
$ cd DragonDOS
$ sudo chmod +x DragonDOS.py
$ sudo chmod +x ip_generators.py
$ sudo chmod +x networkScanner.py

Usage

https:www.youtube.com/

Warning

This script only created to uses on penetration tests.
Only the users be responsible when occurred an abuse.
This script consist of volume-based dos attacks and protocol attacks.
You can choose one of two options. Those are options 1 or option 2.
This program performs IP Spoofing also. (You must use the second option for this)

  • Basic Attack Type
    This Attack type performs with random IP addresses and TCP packets.
    it takes simply destination IP address and destination port number from the user. Then it start the attack.

  • Specific Attack Type

This attack-type contains different options. You can use wordlist files, random IP addresses, your own IP address for the
source IP address.
Additionally, you can use real IP addresses toke from free proxy websites. This program can perform all of them for you.
You can choose the protocol type according to how you want between TCP packets and UDP packets.

This version is only a start-up.
I continue developing this script.
I hope this usefully for you.

If you want to contact me, you should send a mail : info@hasanbaskin.com

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages