modify
All checks were successful
C/C++ CI / build (push) Successful in 21s

This commit is contained in:
ecpvint
2024-06-21 19:06:53 +08:00
parent 4e23ebe167
commit 123724321c
4 changed files with 32 additions and 31 deletions

View File

@ -1,14 +1,16 @@
This is regular hping2 with a few extra features:
此项目扩展至hping3支持了ipv6和一些其他的
* `-6` - required for ipv6 destinations
* `-6` - 来支持IPV6模式
* `--pps`
* `--bps` - set outgoing pps/bps rates. Return packets are not processed in these modes.
* `-flood`-send packets as soon as posible.
* random source ip and dest ip support ipv6
* 随机源端口和目标端口支持 ipv6
Example:
< 克隆来自 https://github.com/alex-testlab/hping6
root@koszik-vps:~# ./hping6 ns1.atw.hu -6 -2 -p 53 -k -s 1583 --traceroute
例子:
root@koszik-vps:~# ./hping3 ns1.atw.hu -6 -2 -p 53 -k -s 1583 --traceroute
HPING ns1.atw.hu (eth0 2a01:270:0:2::11): udp mode set, 48 headers + 0 data bytes
hop=1 TTL 0 during transit from ip=2a00:1f40:2::1 name=2a00-1f40-2--1.pool6.giganet.hu hoprtt=0.9 ms
hop=2 TTL 0 during transit from ip=2a00:1f40:1:bb00::2:1 name=UNKNOWN hoprtt=1005.7 ms
@ -25,9 +27,9 @@ Example:
TCP flood attack with random source ip with ipv6:
root@testlab:~# ./hping6 2022:1:1:1::2 -6 --rand-source --flood
root@testlab:~# ./hping3 2022:1:1:1::2 -6 --rand-source --flood
`2022:1:1:1::2` is the ipv6 address you want to attack
doc: https://github.com/alex-testlab/hping6/wiki
doc: https://github.com/alex-testlab/hping3/wiki