Inundator – Fills ids/ips/waf logs with false positives to obfuscate an attack.
inundator [options] <target>
-a, --auth Credentials for SOCKS proxy in user:pass format. Default: undef -d, --delay Delay in microseconds (millionths of a second) after sending an attack. Default: 0mus since we default to tor, and tor is slow. -n, --no-threads Disable thread support. Default: threads are used. -p, --proxy Define the SOCKS proxy to use for attacks in host:port format. The use of a SOCKS proxy is mandatory for rather obvious reasons. Default: localhost:9050 (tor) -r, --rules Path to directory containing Snort rules files. Default: /etc/snort/rules/ -s, --socks-version Specify SOCKS version to use (4 or 5). Default: 5 -t, --threads Number of concurrent threads. Default: 25 -u, --use-comments Don't ignore commented lines in Snort rules files. Default: commented lines are ignored --verbose Provide more information about attacks sent. --Version Print version information and exit.
[email protected]cyborg:~$ sudo inundator www.ztrela.com defined(@array) is deprecated at inundator.pl line 177. (Maybe you should just omit the defined()?) [+] queuing up attacks... [+] queuing up target(s)... [+] detecting open ports on 184.108.40.206...