Kali Linux - Stress Testing Tool

DHCPig

Keywords: DHCP

DHCPig initiates an advanced DHCP exhaustion attack. It will consume all IPs on the LAN, stop new users from obtaining IPs, release any IPs in use, then for good measure send gratuitous ARP and knock all windows hosts offline. It requires scapy >=2.1 library and admin privileges to execute. No configuration necessary, just pass the interface as a parameter. It has been tested on multiple Linux distributions and multiple DHCP servers (ISC,Windows 2k3/2k8).

Source: https://github.com/kamorin/DHCPig

DHCPig Homepage | Kali DHCPig Repo

  • Author: kamorin
  • License: GPLv2

FunkLoad

Keywords: Web

FunkLoad is a functional and load web tester, written in Python, whose main use cases are:

  • Functional testing of web projects, and thus regression testing as well.
    Performance testing: by loading the web application and monitoring your servers it helps you to pinpoint bottlenecks, giving a detailed report of performance measurement.
  • Load testing tool to expose bugs that do not surface in cursory testing, like volume testing or longevity testing.
  • Stress testing tool to overwhelm the web application resources and test the application recoverability.
  • Writing web agents by scripting any web repetitive task.

Source: http://funkload.nuxeo.org/intro.html

funkload Homepage | Kali funkload Repo

  • Author: Benoit Delbosc, Nuxeo SAS
  • License: GPLv2

iaxflood

Inundator

Keywords: IDS/IPS

  • Intrusion Detection System 入侵检测系统
  • Intrusion Prevention System 入侵防御系统

nundator is a multi-threaded, queue-driven, anonymous intrusion detection false positives generator with support for multiple targets.

Source: http://inundator.sourceforge.net/

Inundator Homepage | Kali Inundator Repo

  • Author: epixoip, L10n
  • License: Other

inviteflood

Keywords: SIP/SDP

A tool to perform SIP/SDP INVITE message flooding over UDP/IP. It was tested on a Linux Red Hat Fedora Core 4 platform (Pentium IV, 2.5 GHz), but it is expected this tool will successfully build and execute on a variety of Linux distributions.

inviteflood Homepage | Kali inviteflood Repo

  • Author: Mark D. Collier, Mark O’Brien
  • License: GPLv2

ipv6-toolkit

Keywords: ipv6

mdk3

Keywords: WiFi

MDK is a proof-of-concept tool to exploit common IEEE 802.11 protocol weaknesses. IMPORTANT: It is your responsibility to make sure you have permission from the network owner before running MDK against it.

mdk3 Homepage | Kali mdk3 Repo

  • Author: ASPj of k2wrlz
  • License: GPLv2

Reaver

Keywords: WiFi

Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases, as described in http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf.

Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.

On average Reaver will recover the target AP’s plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase

Source: https://code.google.com/p/reaver-wps/

Reaver Homepage | Kali Reaver Repo

  • Author: Tactical Network Solutions, Craig Heffner
  • License: GPLv2

rtpflood

Keywords: RTP

SlowHTTPTest

Keywords: HTTP

SlowHTTPTest is a highly configurable tool that simulates some Application Layer Denial of Service attacks. It works on majority of Linux platforms, OSX and Cygwin – a Unix-like environment and command-line interface for Microsoft Windows.

It implements most common low-bandwidth Application Layer DoS attacks, such as slowloris, Slow HTTP POST, Slow Read attack (based on TCP persist timer exploit) by draining concurrent connections pool, as well as Apache Range Header attack by causing very significant memory and CPU usage on the server.

Slowloris and Slow HTTP POST DoS attacks rely on the fact that the HTTP protocol, by design, requires requests to be completely received by the server before they are processed. If an HTTP request is not complete, or if the transfer rate is very low, the server keeps its resources busy waiting for the rest of the data. If the server keeps too many resources busy, this creates a denial of service. This tool is sending partial HTTP requests, trying to get denial of service from target HTTP server.

Source: https://code.google.com/p/slowhttptest/

SlowHTTPTest Homepage | Kali SlowHTTPTest Repo

  • Author: shekyan
  • License: Apache 2.0

t50

Keywords: Network

Multi-protocol packet injector tool for *nix systems, actually supporting 15 protocols. Features: – Flooding – CIDR support – TCP, UDP, ICMP, IGMPv2, IGMPv3, EGP, DCCP, RSVP, RIPv1, RIPv2, GRE, ESP, AH, EIGRP and OSPF support. – TCP Options. – High performance. – Can hit about 1.000.000 packets per second.

t50 Homepage | Kali t50 Repo

  • Author: Nelson Brito, Fernando Mercês
  • License: GPLv2

Termineter

THC-IPV6

Keywords: ipv6

THC-SSL-DOS

Keywords: SSL

THC-SSL-DOS is a tool to verify the performance of SSL. Establishing a secure SSL connection requires 15x more processing power on the server than on the client. THC-SSL-DOS exploits this asymmetric property by overloading the server and knocking it off the Internet. This problem affects all SSL implementations today. The vendors are aware of this problem since 2003 and the topic has been widely discussed. This attack further exploits the SSL secure Renegotiation feature to trigger thousands of renegotiations via single TCP connection.

Source: https://www.thc.org/thc-ssl-dos/

THC-SSL-DOS Homepage | Kali THC-SSL-DOS Repo

  • Author: The Hackers Choice
  • License: GPLv2