Skip to content

Syn flood implementation in C with source IP and port spoofing

Notifications You must be signed in to change notification settings

P-ict0/Syn-Flood-C

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

😁 Welcome!!

Contents

👾 SYN-flood

❗Disclaimer

This repo is created to demonstrate how a SYN-flood attack can be performed. Hacking without permission is illegal. This is strictly educational purposes.

📲 Installation and Usage

Either download the binary syn-flood from the releases or compile it yourself by running:

git clone https://github.com/P-ict0/Syn-Flood-C.git
make

Followed by

sudo ./syn-flood [IP] [PORT]

⚙ Brief explanation

This program is relatively simple. It makes use of raw sockets to create a SYN TCP packet with all the required data, where it randomizes the source IP and port.

After this, in the main function the program enters a loop where it sends thousands of packets to the destination IP and port. The packet's source IP and port are spoofed and randomized in every iteration, see the following wireshark screenshot:

Wireshark packet capture

About

Syn flood implementation in C with source IP and port spoofing

Resources

Stars

Watchers

Forks

Packages

No packages published