此项目扩展至hping3,支持了ipv6和一些其他的 * `-6` - 来支持IPV6模式 * `--pps` * `--bps` - set outgoing pps/bps rates. Return packets are not processed in these modes. * `-flood`-send packets as soon as posible. * 随机源端口和目标端口支持 ipv6 < 克隆来自 https://github.com/alex-testlab/hping6 例子: root@koszik-vps:~# ./hping3 ns1.atw.hu -6 -2 -p 53 -k -s 1583 --traceroute HPING ns1.atw.hu (eth0 2a01:270:0:2::11): udp mode set, 48 headers + 0 data bytes hop=1 TTL 0 during transit from ip=2a00:1f40:2::1 name=2a00-1f40-2--1.pool6.giganet.hu hoprtt=0.9 ms hop=2 TTL 0 during transit from ip=2a00:1f40:1:bb00::2:1 name=UNKNOWN hoprtt=1005.7 ms hop=3 TTL 0 during transit from ip=2001:7f8:35::2:9278:2 name=UNKNOWN hoprtt=2011.2 ms hop=4 TTL 0 during transit from ip=2a02:730:c:b01:b03:0:1:1 name=UNKNOWN hoprtt=3006.7 ms hop=5 TTL 0 during transit from ip=2a01:270:c:c04:103::1 name=UNKNOWN hoprtt=4007.1 ms hop=6 TTL 0 during transit from ip=2a01:270:c:c02:c04::1 name=UNKNOWN hoprtt=5007.7 ms hop=7 TTL 0 during transit from ip=2a01:270:c:106::42 name=UNKNOWN hoprtt=6007.3 ms ^C --- ns1.atw.hu hping statistic --- 12 packets transmitted, 7 packets received, 42% packet loss round-trip min/avg/max = 0.9/3006.7/6007.3 ms TCP flood attack with random source ip with ipv6: root@testlab:~# ./hping3 2022:1:1:1::2 -6 --rand-source --flood `2022:1:1:1::2` is the ipv6 address you want to attack doc: https://github.com/alex-testlab/hping3/wiki