iaxFlood a UDP Inter-Asterisk_eXchange (i.e. IAX) packet was captured from an IAX channel between two Asterisk IP PBX’s. The content of that packet is the source of the payload for the attack embodied by this tool. While the IAX protocol header might not match the Asterisk PBX you’ll attack with this tool, it may require more processing on the part of the PBX than a simple udpflood without any payload that even resembles an IAX payload.
iax flood sourcename destinationname numpackets
cyborg@cyborg:~$ sudo iaxflood 192.168.1.8 220.127.116.11 100000 Will flood port 4569 from port 4569 200 times We have IP_HDRINCL Number of Packets sent: Sent 100000