Re: [netsniff-ng] TCP-SYN Flood Config file
On 11/30/2015 01:02 PM, Burak Özalp wrote: ... I realized that i use v0.5.8 in CentOS 7. İ tested with v0.6.0 with 12 core and finally i can manage to send 6 Mpps without any flags(with Jasper adjusted syn_attack config file) ! Nice to hear! Thanks! -- You received this message because you are subscribed to the Google Groups "netsniff-ng" group. To unsubscribe from this group and stop receiving emails from it, send an email to netsniff-ng+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [netsniff-ng] TCP-SYN Flood Config file
On Sat, 2015-11-28 at 13:56 +0200, Burak Özalp wrote: > Hello again, > > First thank you for your support. I did these configurations. > Threw more CPU with --cpu 24 > Applied basic tuning for network overload testing(Mr.Jesper) > (including upgrading kernel to 3.15) > Test with optimized syn_flood.cfg > (https://github.com/netoptimizer/network-testing/blob/master/trafgen/syn_attack01.trafgen) > with adjusted settings > > With these options current pps is 2.5 Million. > > I attached sysctl.out and config file of kernel. > > Why I couldn't manage to see 12Mpps as Jesper ? > > Best Regards > Burak Özalp > Proper multiqueue settings, like IRQ properly setup ? Using 4 cpus 'only' I get at least 4 Mpps. -- You received this message because you are subscribed to the Google Groups "netsniff-ng" group. To unsubscribe from this group and stop receiving emails from it, send an email to netsniff-ng+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [netsniff-ng] TCP-SYN Flood Config file
On 11/27/2015 08:57 AM, Burak Özalp wrote: Hi everyone; First of all, you've done great job with netsniff-ng!Congrulations! I want to use trafgen to simulate an syn_flood attack. In --help, i saw that " trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`" command. Could you please share tcp_syn.cfg file? Did you try: trafgen -e > tcp_syn.cfg It has a built-in example for getting started. You can test it with: trafgen -e | trafgen -i - -o eth0 --cpp -n 1 If you want to analyse the packet on TX (a la wireshark), you need to: trafgen -e | trafgen -i - -o eth0 --qdisc-path --cpp -n 1 Cheers, Daniel -- You received this message because you are subscribed to the Google Groups "netsniff-ng" group. To unsubscribe from this group and stop receiving emails from it, send an email to netsniff-ng+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[netsniff-ng] TCP-SYN Flood Config file
Hi everyone; First of all, you've done great job with netsniff-ng!Congrulations! I want to use trafgen to simulate an syn_flood attack. In --help, i saw that " trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`" command. Could you please share tcp_syn.cfg file? Best Regards Burak Ozalp -- You received this message because you are subscribed to the Google Groups "netsniff-ng" group. To unsubscribe from this group and stop receiving emails from it, send an email to netsniff-ng+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [netsniff-ng] TCP-SYN Flood Config file
On 11/27/2015 11:01 AM, Burak Özalp wrote: Thank you! I edited the data part and at most i could send 1.800.000 packets per second. Does it possible to increase the pps ? I think that netsniff-ng is a good alternative to netmap, especially about tcp_syn flood attacks. Hmm, likely depends on your network tuning and hardware, people have reported to get ~6Mpps on TCP SYNs: https://www.mail-archive.com/netdev@vger.kernel.org/msg87192.html What kernel/settings do you have for fine-tuning? On 27-11-2015 11:13, Daniel Borkmann wrote: On 11/27/2015 08:57 AM, Burak Özalp wrote: Hi everyone; First of all, you've done great job with netsniff-ng!Congrulations! I want to use trafgen to simulate an syn_flood attack. In --help, i saw that " trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`" command. Could you please share tcp_syn.cfg file? Did you try: trafgen -e > tcp_syn.cfg It has a built-in example for getting started. You can test it with: trafgen -e | trafgen -i - -o eth0 --cpp -n 1 If you want to analyse the packet on TX (a la wireshark), you need to: trafgen -e | trafgen -i - -o eth0 --qdisc-path --cpp -n 1 Cheers, Daniel -- You received this message because you are subscribed to the Google Groups "netsniff-ng" group. To unsubscribe from this group and stop receiving emails from it, send an email to netsniff-ng+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.