Inundator

Description

Inundator – Fills ids/ips/waf logs with false positives to obfuscate an attack.

Usage

Syntax

inundator [options] <target>

Options

-a, --auth          Credentials for SOCKS proxy in user:pass format.
Default: undef
-d, --delay         Delay in microseconds (millionths of a second) after  sending an attack.
Default: 0mus since we default to tor, and tor is slow.
-n, --no-threads    Disable thread support.
Default: threads are used.
-p, --proxy         Define the SOCKS proxy to use for attacks in host:port format. The use of a SOCKS proxy is mandatory for rather obvious reasons.
Default: localhost:9050 (tor)
-r, --rules         Path to directory containing Snort rules files.
Default: /etc/snort/rules/
-s, --socks-version Specify SOCKS version to use (4 or 5).
Default: 5
-t, --threads       Number of concurrent threads.
Default: 25
-u, --use-comments  Don't ignore commented lines in Snort rules files.
Default: commented lines are ignored
--verbose           Provide more information about attacks sent.
--Version           Print version information and exit.

Example

[email protected]cyborg:~$ sudo inundator www.ztrela.com
defined(@array) is deprecated at inundator.pl line 177.
    (Maybe you should just omit the defined()?)
[+] queuing up attacks...
[+] queuing up target(s)...
[+] detecting open ports on 162.144.208.86...
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?