wild horde is a useful tool for investigate bugs and to find out vulnerabilities.

wild horde is a useful tool for investigate bugs and to find out vulnerabilities.

This code has been posted for information and educational purposes. The execution of a Denial Of Service (DOS) attack in systems and services without the owner’s authorisation is illegal. The misuse of the information and the software in this repo can result in criminal charges brought against the perpetrator of the crime. Any actions and or activities related to the material contained within this Git Repository is solely your responsibility. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information or the software in this website to break the law.

Wh (Wild Horde) is a test/stress tool capable to send heavy network traffic composed by malformed icmp packets. After the publication of the Blacknurse bug, I was wondering how many network appliance, IOT devices, etc could be affected by similar problems, so I started to write this tool for that purpose and for fun.Prerequisites:
The program is intended to be used in a *nix environment and it is tested on various Linux distributions and OS X:
+ RHEL7 Linux x86_64;
+ Ubuntu 16.04 LTS;
+ Ubuntu 14.04 LTS;
+ Debian 7 (“wheezy”);
+ OS X 10.11.6;

using, as compiler, one in this list:
– clang version 4.0.0;
– clang version 3.8.1;
– gcc version 4.8.5 20150623 (Red Hat 4.8.5-4) (GCC);
– gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3);
– gcc version 4.7.2 (Debian 4.7.2-5);
– Apple LLVM version 6.0 (clang-600.0.57) (based on LLVM 3.5svn)

To compile the program, this tools/libraries are necessary:
– a c++ compiler ( with c++11 support);
– automake/autoconf with libtool;
– libreadline;
– libcap (Only Linux, capabilities lib);

( on Debian/Ubuntu the packages are: libreadline-dev and libcap-dev, on RHEL7: libcap-devel.x86_64 and readline-devel.x86_64 ).

Usage and install from source:

Source: https://github.com/gbonacini