Azure DDoS Protection/Breaking Point SDK/syn-flood.py (18 lines of code) (raw):
import time
from ixia.bpcddos.session import Session
# constants
__USER_EMAIL = 'username@example.com'
__PASSWORD = 'password'
__POLL_TIME = 15
# valid public ip for Web app or internet facing endpoint/resource
__TARGET_IP = 'valid-public-ip-in-your-azure-subscription'
__TARGET_PORT = 443
__PROFILE_ID = 'tcp-syn-flood'
__PROFILE_SIZE = 'small'
__TEST_DURATION = 600
if __name__ == '__main__':
session = Session(__USER_EMAIL, __PASSWORD)
# start test using string params
new_test = session.start_test(
__TARGET_IP, __TARGET_PORT,
__PROFILE_ID, __PROFILE_SIZE, __TEST_DURATION
)
# wait for the test to finish:
while not new_test.stopped:
time.sleep(__POLL_TIME)