One of most common attack on some company is ddos attack. What is DDOS attack? this attack is very easy hacking method to do, attacker just have to send a thousand data just like flooding, if the data is successfully send to target server then the server start to slowing down and crash. How to do ddos attack? you can perform ddos attack with several tools like ddosify. This tool is very easy to use with powerfull performance on ddos attack.
Ddosify is high performance load testing tool, written in Golang. Send big data to target server.
- Protocol Agnostic – Currently supporting HTTP, HTTPS, HTTP/2. Other protocols are on the way.
- Scenario-Based – Create your flow in a JSON file. Without a line of code!
- Different Load Types – Test your system’s limits across different load types.
Ddosify is available via Docker, Homebrew Tap, and downloadable pre-compiled binaries from the releases page for macOS, Linux and Windows.
apk, deb, rpm, Arch Linux packages
- For arm architectures change
- Superuser privilege is required.
# For Redhat based (Fedora, CentOS, RHEL, etc.) rpm -i https://github.com/ddosify/ddosify/releases/latest/download/ddosify_amd64.rpm # For Debian based (Ubuntu, Linux Mint, etc.) wget https://github.com/ddosify/ddosify/releases/latest/download/ddosify_amd64.deb dpkg -i ddosify_amd64.deb # For Alpine wget https://github.com/ddosify/ddosify/releases/latest/download/ddosify_amd64.apk apk add --allow-untrusted ddosify_amd64.apk # For Arch Linux git clone https://aur.archlinux.org/ddosify.git cd ddosify makepkg -sri
This section aims to show you how to use Ddosify without deep dive into its details easily.
1. Simple load test
The above command runs a load test with the default value that is 100 requests in 10 seconds.
2. Using some of the features
Ddosify sends a total of 1000 PUT requests to https://target_site.com over proxy http://proxy_server.com:80 in 20 seconds with a timeout of 7 seconds per request.
3. Scenario based load test
Ddosify first sends HTTP/2 POST request to https://test_site1.com/endpoint_1 using basic auth credentials test_user:12345 over proxy http://proxy_host.com:proxy_port and with a timeout of 3 seconds. Once the response is received, HTTPS GET request will be sent to https://test_site1.com/endpoint_2 along with the payload included in config_examples/payload.txt file with a timeout of 2 seconds. This flow will be repeated 20 times in 5 seconds and response will be written to stdout.