Inundator包装说明

Inundator是一个多线程,队列驱动的,匿名的入侵检测误报发电机对多个目标的支持。

资料来源:http://inundator.sourceforge.net/
Inundator首页 | 卡利Inundator回购

  • 作者:epixoip,本地化
  • 许可:其它

包含在inundator包工具

inundator - 多线程的IDS误报发生器
[email protected]:~# inundator -h
help


inundator - fills ids/ips/waf logs with false positives to obfuscate an attack.
Syntax: /usr/bin/inundator [options] <target>


Options:

    -a, --auth          Credentials for SOCKS proxy in user:pass format.
                        Default: undef

    -d, --delay         Delay in microseconds (millionths of a second) after
            sending an attack.
                        Default: 0mus since we default to tor, and tor is slow.

    -n, --no-threads    Disable thread support.
            Default: threads are used.

    -p, --proxy         Define the SOCKS proxy to use for attacks in host:port
                        format. The use of a SOCKS proxy is mandatory for rather
                        obvious reasons.
                        Default: localhost:9050 (tor)

    -r, --rules         Path to directory containing Snort rules files.
                        Default: /etc/snort/rules/

    -s, --socks-version Specify SOCKS version to use (4 or 5).
                        Default: 5

    -t, --threads       Number of concurrent threads.
                        Default: 25

    -u, --use-comments  Don't ignore commented lines in Snort rules files.
                        Default: commented lines are ignored

    --verbose           Provide more information about attacks sent.

    --Version       Print version information and exit.


Target:

    - Single host (FQDN or ip addr)

    - Range of ip addrs

    - Subnet in CIDR format

See 'man 1 inundator' for more information.

inundator用法示例

使用5个线程(-t 5)充斥目标系统(192.168.1.1):

[email protected]:~# inundator -t 5 192.168.1.1
[+] queuing up attacks...
[+] queuing up target(s)...
[+] detecting open ports on 192.168.1.1...
[+] child 1 now attacking.