T50 – The Fastest Mixed Packet Injector Tool

Outsmart Malicious Hackers


T50 (f.k.a. F22 Raptor) is a high performance mixed packet injector tool designed to perform Stress Testing.

T50 - The Fastest Mixed Packet Injector Tool

The concept started on 2001, right after release ‘nb-isakmp.c‘, and the main goal was to have a tool to perform TCP/IP protocol fuzzing, covering common regular protocols, such as: ICMP, TCP and UDP.

Why Stress Testing?

Why Stress Testing? Well, because when people are designing a new network infra-structure (e.g. Data center serving to Cloud Computing) they think about:

  1. High-Availability
  2. Load Balancing
  3. Backup Sites (Cold Sites, Hot Sites, and Warm Sites)
  4. Disaster Recovery
  5. Data Redundancy
  6. Service Level Agreements

But almost nobody thinks about Stress Testing, or even performs any test to check how the networks infra-structure behaves under stress, under overload, and under attack. Even during a Penetration Test, people prefer not running any kind of Denial-of-Service testing. Even worse, those people are missing one of the three key concepts of security that are common to risk management:

  • Confidentiality
  • Integrity
  • AVAILABILITY

T50 was designed to perform Stress Testing on a variety of infra-structure network devices (Version 2.45), using widely implemented protocols, and after some requests it was was re-designed to extend the tests (as of Version 5.3), covering some regular protocols (ICMP, TCP and UDP), some infra-structure specific protocols (GRE, IPSec and RSVP), and some routing protocols (RIP, EIGRP and OSPF).

Features

T50 is a powerful and unique packet injector tool, which is capable of sending sequentially the following fourteen protocols:

  1. ICMP – Internet Control Message Protocol
  2. IGMPv1 – Internet Group Management Protocol v1
  3. IGMPv3 – Internet Group Management Protocol v3
  4. TCP – Transmission Control Protocol
  5. EGP – Exterior Gateway Protocol
  6. UDP – User Datagram Protocol
  7. RIPv1 – Routing Information Protocol v1
  8. RIPv2 – Routing Information Protocol v2
  9. DCCP – Datagram Congestion Control Protocol
  10. RSVP – Resource ReSerVation Protocol
  11. GRE – Generic Routing Encapsulation
  12. IPSec – Internet Protocol Security (AH/ESP)
  13. EIGRP – Enhanced Interior Gateway Routing Protocol
  14. OSPF – Open Shortest Path First

It is the only tool capable to encapsulate the protocols (listed above) within Generic Routing Encapsulation (GRE).

It can also send an (quite) incredible amount of packets per second, making it a second to none tool:

  • More than 1,000,000 pps of SYN Flood (+50% of the network uplink) in a 1000BASE-T Network (Gigabit Ethernet).
  • More than 120,000 pps of SYN Flood (+60% of the network uplink) in a 100BASE-TX Network (Fast Ethernet).

Perform Stress Testing on a variety of network infrastructure, network devices and security solutions in place.

And also Simulate “Distributed Denial-of-Service” & “Denial-of-Service” attacks, validating Firewall rules, Router ACLs, Intrusion Detection System and Intrusion Prevention System policies.

The main differentiation of the T50 is that it is able to send all protocols, sequentially, using one single SOCKET, besides it is capable to be used to modify network routes, letting IT Security Professionals perform advanced Penetration Tests.

You can download T50 here:

t50-v5.6.15.zip

Or read more here.

Posted in: Hacking Tools, Networking Hacking

, ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


Comments are closed.