Skip to content

razielapps/ghostdos

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

3 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐ŸŒฉ๏ธ GhostDOS - Advanced DDoS Stress Testing Tool

โš ๏ธ LEGAL WARNING

GhostDOS is for authorized security testing ONLY. Use only on systems you own or have explicit written permission to test. Unauthorized use may violate laws and result in severe penalties.

๐Ÿ“‹ Features

Advanced Evasion Techniques

  • IP Spoofing: Multiple modes (random, geographic, cloud providers)
  • Human Behavior Simulation: Realistic browsing patterns
  • Protocol Mixing: Multiple attack vectors simultaneously
  • Traffic Pattern Randomization: Mimics real user surges
  • TLS/SSL Support: Encrypted attack traffic
  • Browser Fingerprinting: Realistic HTTP headers and cookies

Attack Vectors

  1. HTTP/HTTPS Flood: Human-like web traffic
  2. TCP SYN Flood: Connection exhaustion
  3. SlowLoris: Slow HTTP connections
  4. DNS Amplification: Reflected amplification attacks
  5. Mixed Attacks: Multiple vectors simultaneously

Realism Features

  • Geographic IP distribution
  • Real browser user agents
  • Search query simulation
  • Session persistence
  • Referrer chains
  • Human think times
  • Randomized delays

๐Ÿš€ Quick Start

Prerequisites

# Kali Linux (recommended) or any Linux with:
# - Python 3.8+
# - Root privileges (for raw sockets)
# - Basic networking tools

# Check Python version
python3 --version

# Check privileges (need root)
sudo whoami

Installation

# 1. Download GhostDOS
git clone https://github.com/razielapps/ghostdos.git
cd ghostdos

# 2. Run setup script (as root)
sudo bash setup_ghostdos.sh

# 3. Make executable
chmod +x ghostdos.py

Basic Usage

# Show help
sudo python3 ghostdos.py --help

# Basic attack (60 seconds, medium intensity)
sudo python3 ghostdos.py --target example.com:80 --duration 60 --intensity medium

# HTTPS attack
sudo python3 ghostdos.py --target https://target.com --duration 120 --intensity high

# Custom configuration
sudo python3 ghostdos.py --target 192.168.1.100:443 --duration 300 --spoof geographic --intensity extreme

โš™๏ธ Configuration

Command Line Options

--target, -t     Target (IP:port, domain:port, or URL) [REQUIRED]
--duration, -d   Attack duration in seconds (default: 60)
--intensity, -i  Intensity level: low, medium, high, extreme (default: medium)
--spoof, -s      Spoofing mode: random, geographic, sequential, cloud_providers
--protocol, -p   Protocol: mixed, http, syn, dns, slowloris (default: mixed)
--threads        Override thread count
--verbose, -v    Verbose output
--dry-run        Simulate without sending packets

Intensity Levels

Level Threads Packets/Sec Description
Low 10 100 Stealth testing
Medium 50 1,000 Standard load
High 200 5,000 Stress testing
Extreme 500 10,000 Maximum load

Spoofing Modes

  1. Random: Completely random IP addresses
  2. Geographic: Regional distribution (mimics global users)
  3. Sequential: Sequential IPs from cloud ranges
  4. Cloud Providers: Only cloud provider IP addresses

๐Ÿ”ง How It Works

Attack Methodology

1. Target Analysis
   โ”œโ”€โ”€ Parse target (IP/port/URL)
   โ”œโ”€โ”€ Determine protocol
   โ””โ”€โ”€ Select attack vectors

2. IP Spoofing
   โ”œโ”€โ”€ Generate spoofed source IPs
   โ”œโ”€โ”€ Randomize source ports
   โ””โ”€โ”€ Geographic distribution

3. Human Behavior Simulation
   โ”œโ”€โ”€ Realistic browser fingerprints
   โ”œโ”€โ”€ Session cookies
   โ”œโ”€โ”€ Referrer chains
   โ””โ”€โ”€ Human think times

4. Protocol Attacks
   โ”œโ”€โ”€ HTTP/HTTPS floods
   โ”œโ”€โ”€ TCP SYN floods
   โ”œโ”€โ”€ SlowLoris connections
   โ””โ”€โ”€ DNS amplification

5. Evasion
   โ”œโ”€โ”€ Traffic pattern randomization
   โ”œโ”€โ”€ TLS encryption
   โ”œโ”€โ”€ Header randomization
   โ””โ”€โ”€ Rate limiting

Realism Techniques

  • Burst Patterns: Mimic real user activity bursts
  • Geographic Distribution: IPs from actual regions
  • Browser Fingerprints: Real Chrome/Firefox/Safari headers
  • Session Persistence: Maintain cookies and sessions
  • Referrer Simulation: Realistic navigation paths
  • Human Delays: Reading/thinking times between actions

๐Ÿ“Š Output & Results

Log Files

ghost_logs/
โ””โ”€โ”€ ghostdos_20240115_143022.log

Log Format:

2024-01-15 14:30:22 | INFO     | Thread-1       | Starting HTTP flood on example.com:80
2024-01-15 14:30:27 | INFO     | MainThread     | Progress: 5.0s | Active: 50/50 | Packets: 1250 (250.0/s)

Report Files

ghost_reports/
โ””โ”€โ”€ attack_20240115_143022.json

Report Content:

{
  "target": "example.com:80",
  "timestamp": "2024-01-15T14:30:22",
  "duration_seconds": 60,
  "intensity": "medium",
  "total_packets": 45000,
  "total_bytes": 225000000,
  "packets_per_second": 750.0,
  "bytes_per_second": 3750000.0,
  "attack_distribution": {
    "HTTPFlood": 35,
    "SYNFlood": 15
  },
  "spoofing_mode": "geographic"
}

Real-time Statistics

During execution, you'll see:

Progress: 15.0s | Active: 48/50 | Packets: 11250 (750.0/s) | Bytes: 56.2MB (3.7MB/s)

โš–๏ธ Legal & Ethical Use

Acceptable Use Cases

  1. Authorized Penetration Testing: With written permission
  2. Security Research: In controlled lab environments
  3. System Hardening: Testing your own infrastructure
  4. Educational Purposes: Classroom learning with permission
  5. Bug Bounty Programs: Within explicitly defined scope

Prohibited Activities

  1. Unauthorized Testing: Any system without permission
  2. Service Disruption: Causing downtime for others
  3. Malicious Attacks: For harm or extortion
  4. Law Violation: Breaking computer fraud laws
  5. Terms of Service Violation: Cloud provider ToS

Legal Compliance

  • Computer Fraud and Abuse Act (CFAA)
  • General Data Protection Regulation (GDPR)
  • Local Cybersecurity Laws
  • Service Provider Terms
  • Organizational Policies

๐Ÿ” Troubleshooting

Common Issues

Permission Denied

Error: "Permission denied" for raw sockets

Solution:

sudo python3 ghostdos.py [options]

No Network Connectivity

Error: Connection refused/timeout

Check:

  1. Target is online and reachable
  2. No firewall blocking
  3. Correct port is open
  4. DNS resolution works

Performance Issues

Low packet rate

Adjust:

# Reduce thread count
--threads 20

# Lower intensity
--intensity low

# Increase system limits
ulimit -n 65535
sysctl -w net.core.somaxconn=65535

Debug Mode

# Verbose output
sudo python3 ghostdos.py --target example.com --verbose

# Dry run (simulation)
sudo python3 ghostdos.py --target example.com --dry-run

# Save output
sudo python3 ghostdos.py --target example.com 2>&1 | tee output.log

๐ŸŽ“ Educational Value

Learning Objectives

This tool demonstrates:

  1. Network Protocols: TCP/IP, HTTP, DNS, SSL/TLS
  2. Attack Vectors: Multiple DDoS techniques
  3. Evasion Techniques: IP spoofing, traffic mimicry
  4. Traffic Analysis: Pattern recognition
  5. Defense Strategies: Mitigation techniques
  6. Ethical Considerations: Responsible disclosure

Defensive Insights

By understanding attacks, you learn to:

  • Implement rate limiting
  • Configure Web Application Firewalls (WAF)
  • Set up intrusion detection systems (IDS)
  • Deploy DDoS protection services
  • Monitor traffic patterns
  • Respond to incidents

๐Ÿ›ก๏ธ Defensive Countermeasures

Detection Signs

  1. Unusual Geographic Distribution: Traffic from unexpected regions
  2. Header Anomalies: Non-standard browser headers
  3. Session Patterns: Unusual cookie/session behavior
  4. Rate Abnormalities: Sudden traffic spikes
  5. Protocol Mixing: Multiple attack vectors simultaneously

Mitigation Strategies

  1. Rate Limiting: Per-IP request limits
  2. Geo-blocking: Block suspicious regions
  3. CAPTCHA: Challenge suspicious traffic
  4. WAF Rules: Pattern-based blocking
  5. CDN Protection: Cloud-based DDoS protection
  6. Traffic Scrubbing: Clean traffic centers

๐Ÿ“š Resources

Further Reading

Similar Tools (Educational)

  • LOIC: Low Orbit Ion Cannon
  • HOIC: High Orbit Ion Cannon
  • HULK: HTTP Unbearable Load King
  • R.U.D.Y: R-U-Dead-Yet (SlowLoris)

Defensive Tools

  • Snort: Intrusion Detection
  • Suricata: Network Security Monitoring
  • ModSecurity: Web Application Firewall
  • Fail2Ban: Intrusion Prevention

๐Ÿ”ฎ Future Development

Planned Features

  1. AI-Powered Traffic Generation: Machine learning for realism
  2. Blockchain Integration: Decentralized attack coordination
  3. Mobile Traffic Simulation: Smartphone user behavior
  4. API Attacks: REST/graphQL specific attacks
  5. Cloud Service Attacks: AWS/Azure/GCP specific vectors

Research Areas

  • Adversarial machine learning
  • Zero-day attack vectors
  • Quantum-resistant cryptography
  • 5G network vulnerabilities
  • IoT device security

โš ๏ธ FINAL WARNING

USE RESPONSIBLY AND LEGALLY.

GhostDOS is a powerful security tool that can cause serious harm if misused.

Always obtain proper authorization before testing any system.

The developers assume no liability for misuse of this software.


GhostDOS v2.0 - Advanced DDoS stress testing for security professionals. Remember: With great power comes great responsibility.

Key Features Summary:

1. Advanced Spoofing

  • Multiple IP spoofing modes
  • Geographic distribution
  • Cloud provider IPs
  • Sequential/random patterns

2. Human Behavior Simulation

  • Real browser fingerprints
  • Session persistence
  • Referrer chains
  • Human think times
  • Search query simulation

3. Multiple Attack Vectors

  • HTTP/HTTPS floods
  • TCP SYN floods
  • SlowLoris
  • DNS amplification
  • Mixed attacks

4. Evasion Techniques

  • Traffic pattern randomization
  • TLS encryption
  • Header randomization
  • Rate limiting
  • Geographic distribution

5. Professional Features

  • Real-time statistics
  • JSON reporting
  • Logging system
  • Performance monitoring
  • Resource management

Author: Conscience Ekhomwandolor

About

Advanced DDoS Stress Testing Tool

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages