Please see here:
This is one tool we use to validate tools we use.
http://www.opensta.org/
OpenSTA is a distributed software testing architecture designed around
CORBA, it was originally developed to be commercial software by CYRANO
<http://portal.opensta.org/faq.php?topic=CYRANO> . The current toolset
has the capability of performing scripted HTTP and HTTPS heavy load
tests with performance measurements from Win32 platforms.
Regards,
Sonny
Sonny Discini, Senior Network Security Engineer
Department of Technology Services
Enterprise Infrastructure Division
Montgomery County Government
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dombrowski, Stan
Sent: Wednesday, February 27, 2008 8:40 PM
To: [email protected]
Subject: HOW do you configure
A DOS attack.... I'm trying to test a new product we just
purchased. It's a Packeteer which will recognize and deal with unusal
traffic flow and bandwidth problems. We experienced several internal DOS
attacks from internal hosts caused by bots. I've configured the
Packeteer but haven't found a way to test the device. I have it set up
on a private vlan with just the nessus server/client, the Packeteer and
a test host. But running the normal scan with DOS enabled doesn't
generate much traffic. How do I crank it up to really eat up the
bandwidth and emulate an attack. No animals will be used in this
experiment and it is safe for childrens consumption as required by the
FDA. Appreciate any help as I just downloaded this software and am a
newbie.
stan
------------------------------------------------------------------------
--------
This e-mail message is intended only for the personal use of the
recipient(s)
named above. If you are not an intended recipient, you may not
review, copy or
distribute this message. If you have received this communication
in error,
please notify the San Francisco Chronicle by sending a message
from this
feedback page: http://sfgate.com/feedback/ and delete the
original message.
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus