Play like a hacker with the all too easy to use Denial of Service testing tool. DoSHTTP's pull-down menus and button interface takes only a few seconds to understand. Even those who only slightly understand Denial of Service floods can operate this tool. In other words, though it may be designed for professionals to test performance and protection software it can be used for the wrong reasons. That's probably why the demo is severely limited to four tests and a maximum of 5,000 DoS requests per session.
Warning aside, this is a dead simple tool for professionals. Enter the target, set a user agent, choose how many sockets and requests and click a button to start the flood. A button click will just as easily stop the attack.
Starting a flood is easy, but what do users learn? DoSHTTP includes a very simple report to list the attack duration, requests issued, request rate, responses received, and requests lost percentage. Those numbers are easily compared with what your firewall reports from the attack.
The limited demo is expected for this type of application, but the four uses still gives administrators enough of a trial run to see if DoSHTTP suits their needs.