Home

Awesome

GitHub release (latest by date) Maintainability GitHub code size in bytes GitHub last commit

TCPcannon

TCPcannon is a Linux tool for launching network attacks. It is built on top of RawTCP, my library to manage network packets and raw sockets.

The purpose of this development is to reproduce real network attacks using only the C language and with minimal dependencies.

Currently it only incorporates a SYN flooding module with and without spoofing, but more attacking modules and modes will come in later updates.

The name is a reference to the LOIC.

Installation

You can download the binary file for TCPcannon here.

Usage

Run ./TCPcannon -h to get tool usage:

<img src="images/help_output.png" width = 800/>

Examples

Note: As stated in the library RawTCP, raw sockets require root proviliges to be used, so you will need them before running any of these examples.

SYN flood attack against 192.168.1.1 at port 8080

./TCPcannon -S -m direct -d 192.168.1.1:8000

SYN flooding against 192.168.1.1 at port 8080 randomly with spoofing

Source IP changes randomly between each sent packet.

./TCPcannon -S -m spoof -d 192.168.1.1:8000

Benchmark for packets/minute sent with SYN flooding spoofing mode

You will get the number of packets sent and packets/minute.

./TCPcannon -S -m benchmark -d 192.168.1.1:8000

Issues?

Whether it is a bug, question or suggestion, please open a ticket and I will have a look at it as fast as I possibly can.

LICENSE

This software is licensed under the MIT license. See LICENSE