tcpkiller
                                
                                 tcpkiller copied to clipboard
                                
                                    tcpkiller copied to clipboard
                            
                            
                            
                        kills all TCP connections on a network
tcpkiller
tcpkiller is a utility to kill all TCP connections on a network. It works by intercepting network traffic, and forging RST packets of existing connections to cause hangups. Works for both IPv4 connections and IPv6.
tcpkiller is a sneaky way to kill network connections. Any targeted system will appear to work when examined through typical diagnostics - DNS will resolve, ICMP's will go through, and the network card will be able to connect to the network- but no TCP connections will be sustained. Currently, tcpkiller only supports packets encapsulated by Ethernet headers, not 802.11 encapsulation.
Usage:
$ ./tcpkiller -i eth0
[*] Initialized tcpkiller on eth0 in quiet mode, targeting all. Press Ctrl-C to exit.
...
Options:
- -a, --allowdo not attack this ip address's connections, whether it's the source or destination of a packet
- -as, --allow-sourcedo not attack this ip address's connections, but only if it's the source of a packet
- -ad, --allow-destinationdo not attack this ip address's connections, but only if it's the destination of a packet
- -t, --targetactively target given ip address, whether it is the source or destination of a packet (and allow all other connections)
- -ts, --target-sourceactively target this ip address, but only if it's the source
- -td, --target-destinationactively target this ip address, but only if it's the destination of a packet
- -o, --allow-portdo not attack any connections involving this port, whether it's the source or destination of a packet
- -os, --allow-source-portdo not attack any connections involving this port, but only if it's the source of a packet
- -od, --allow-destination-portdo not attack any connections involving this port, but only if it's the destination of a packet
- -p, --target-portactively target any connections involving these ports whether it is the source or destination of a packet (and allow all other connections)
- -ps, --target-source-portactively target any connections involving this port, but only if it's the source
- -pd, --target-destination-portactively target any connections involving this port, but only if it's the destination of a packet
- -r, --randomize {often,half,seldom,all}target only SOME of the matching packets for increased stealthiness. defaults to "all"
- -i, --interfacespecify interface to listen on
- -s, --silentsilences all terminal output
- -v, --verboseverbose output
- -h, --helpprints usage and help menu
Installation
tcpkiller relies on Scapy, and is designed to run on Ubuntu or Kali Linux. Due to restrictions on network card promiscuous mode in OS X and Windows, these platforms are not supported.
To install Scapy:
$ sudo apt-get install scapy
To setup tcpkiller:
$ git clone https://github.com/Kkevsterrr/tcpkiller && cd tcpkiller
$ sudo chmod +x tcpkiller
$ sudo ifconfig <interface> promisc
$ ./tcpkiller -i <interface>
...