/syn_flood_on_twincat-server-via-docker

A ubuntu conteinerized script floods via local TCP requests a twin cat server hosted on the local network. The usage of a Wireshark or any package analyser is advised

Primary LanguageShellMIT LicenseMIT

SYN TCP Flood via Docker

A ubuntu conteinerized script floods via local TCP requests a TwinCAT server hosted on the local network. The usage of a Wireshark or any package analyser is advised

License

This project is licensed under the MIT License.

Requirements

Docker v20.10.12 curl v7.64.1 Linux ubuntu v20.04 GNU bash, v3.2.57 TwinCAT+TF2000 HMI Server Target environment (used: win10) Attacker environment (used: macOS BigSur)

Attack Architecture

The attack is using the instruction pipelining processing to execute parallelly the docker containers containing the evil file.

image

Result

image