Skip to content

wumaoland/hoho_ddos2

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

hoho_ddos2.0

hoho_ddos2.0 is a simulation program for various types of DDOS (Distributed Denial of Service) attacks, designed to help cybersecurity professionals understand and test different types of network attacks. This program features a colorful ASCII art and user-friendly interface, making it easy to use.

hoho_ddos2.0 中文 | English Static Badge

Features

  • Multiple Attack Types: Supports various common DDOS attack types, including Flood Attack, Server Attack, Slow Attack, Protocol-specific Attack, and more.
  • Beyond the First Generation: Offers more functionality compared to hoho_ddos.
  • Easy to Use: The program is designed to be simple, allowing users to quickly conduct tests by selecting attack types and setting parameters as prompted.

Recent Update

hoho_ddos2.2

Update Details:

  1. Added a new attack type called IPv6 DDOS Attack.
  2. Added 8 new attack methods, including:
    • from "Other_attack" category:
      6. Replay Attack
      
    • And 7 from "IPv6 DDOS Attack" category:
      1. ICMPv6_Flood
      2. IPv6_Replay_Attack
      3. IPv6_Flood_Attack
      4. IPv6_SLAAC_Flood
      5. IPv6_Fragmentation_Attack
      6. Neighbor_Cache_Exhaustion
      7. IPv6_ND
      
    Starting from version 2.2, hoho_ddos2 now supports IPv6 attacks.

Installation

Install necessary pip libraries:

colorama, scapy, requests, sippy library

pip install colorama
pip install scapy
pip install requests
pip install sippy

Linux

  1. Download the Code: Clone this repository to your local machine:

    git clone https://github.com/sansjtw/hoho_ddos2.git
  2. Run the Program: Navigate to the project directory and execute the main program:

    cd hoho_ddos2.0
    python main.py

Windows

  1. Download the Code: Clone this repository to your local machine:

    git clone https://github.com/sansjtw/hoho_ddos2.git
  2. Download Python 3.11.8: Install Python 3.11.8 from the official website python3.11.8

  3. Run the Program: After installing Python, navigate to the project directory and double-click main.py to run the program.

language

  • English main.py
  • China main_cn.py

Attack Program Classification

Flood Attacks

  1. ACK_Flood
  2. Connection_Flood
  3. DNS_Query_Flood
  4. HTTP_Flood
  5. ICMP_Flood
  6. IP_Flood
  7. Ntp_Request_Flood
  8. SYN_Flood
  9. UDP_Reflection_Flood
  10. Advanced_IP_Flooding
  11. Advanced_HTTP_Flooding
  12. Advanced_ICMP_Flooding
  13. Advanced_DNS_Query_Flood
  14. Advanced_UDP_Reflection_Flood
  15. Advanced_SYN_Flood

Slow Attacks

  1. Slow_Read_attack
  2. Slowloris_attack

Protocol-specific Attacks

  1. Minecraft_Protocol_Attacks
  2. SSDP_attack

Server Attacks

  1. Cache_Server_Attack
  2. Minecraft_server_DDoS
  3. translation_server_ddos

IPv6 DDOS Attack

  1. ICMPv6_Flood
  2. IPv6_Replay_Attack
  3. IPv6_Flood_Attack
  4. IPv6_SLAAC_Flood
  5. IPv6_Fragmentation_Attack
  6. Neighbor_Cache_Exhaustion
  7. IPv6_ND

Other Types of Attacks

  1. DNS_Amplification
  2. RUDY_Attack
  3. Smurf_attack
  4. Sip_Register_Flood
  5. Sip_Invite_Flood
  6. Sip_lnvite_Flood

Usage Instructions

  • Upon running the program, it will display the main menu, prompting the user to select the attack type to simulate.
  • Choose the desired attack type as prompted and set relevant parameters if necessary, then the program will automatically start simulating the attack.
  • During the attack, the program will display the progress and relevant information, allowing the user to terminate the attack at any time.

Notes

  • Do not use this program for illegal purposes. It is intended for legitimate security testing and educational purposes only.
  • Using this program may cause disruption or downtime to target systems, so use it with caution.
  • This program does not provide any form of warranty or support. Users are responsible for any risks incurred.

License

This project is licensed under the MIT License. For more details, see the LICENSE file.

Author Information

Release History

hoho_ddos2.2

Update Date: June 1, 2024 (Beijing Time)

Updates:

  1. Added a new attack type named IPv6 Flood Attack.
  2. Added 8 new attack methods, including:
6. Replay Attack

Under "Other types of attacks" and the following under "IPv6 Flood Attack":

1. ICMPv6_Flood
2. IPv6_Replay_Attack
3. IPv6_Flood_Attack
4. IPv6_SLAAC_Flood
5. IPv6_Fragmentation_Attack
6. Neighbor_Cache_Exhaustion
7. IPv6_ND

Starting from version 2.2, hoho_ddos2 now supports IPv6 attacks.

hoho_ddos2.1

Update Date: June 1, 2024 (Beijing Time)

Updates:

  1. Added 5 advanced attacks, listed under "Type flood attacks":
10. Advanced_IP_Flooding
11. Advanced_HTTP_Flooding
12. Advanced_ICMP_Flooding
13. Advanced_DNS_Query_Flood
14. Advanced_UDP_Reflection_Flood
15. Advanced_SYN_Flood

Advanced attacks are characterized by greater customization and efficiency compared to standard attacks.