Use UDP.c for Linux, UDP_MacOS for Mac. (Windows untested).
-
Fill in the 5 To-Do's in the file so it compiles and works properly.
-
Launch an attack against victim's IP address (as an example, an Apache web server listening on port 80)
-
Launch Wireshark on victim's computer to see the incoming UDP packets
-
Submit Wireshark screenshot (including UDP target port) and the UDP flood completed code.
Bonus: Spoof your IP packet so it appears to your victim that the packet comes from a different server (Hint: in setup_ip_header())