OP 09 September, 2024 - 11:46 PM
As far as I know this hping3 command is used to simulate an ICMP DDoS attack. Here I show you the command and what it does:
hping3 --icmp --rand-source --flood -d (IP of the “victim” machine).
What does this command do?
--icmp: Sends ICMP packets that can overload your network if sent in bulk.
--rand-source: Generates random source IP addresses, making it difficult to block the attack.
--flood: Sends packets at the maximum possible speed, trying to saturate bandwidth or network resources.
-d 120: Determines the packet size in bytes, in this case 120 bytes.
Any input you know about the subject? what would you add to this command?
hping3 --icmp --rand-source --flood -d (IP of the “victim” machine).
What does this command do?
--icmp: Sends ICMP packets that can overload your network if sent in bulk.
--rand-source: Generates random source IP addresses, making it difficult to block the attack.
--flood: Sends packets at the maximum possible speed, trying to saturate bandwidth or network resources.
-d 120: Determines the packet size in bytes, in this case 120 bytes.
Any input you know about the subject? what would you add to this command?