top of page

RedWolf DDoS Testing Platform

The World's #1 choice for DDoS Testing

The only way to truly know if you are prepared for a DDoS attack is to perform realistic tests of monitoring and defense systems. Testing DDoS controls is complex as DDoS defenses operate across a host of technologies and providers. RedWolf's DDoS testing suite provides a staggering variety of test cases capable of targeting web servers, load balancers, encryption providers, DNS infrastructure, routers, WAF and DDoS appliances, ISP mitigation and cloud mitigation systems.

What kinds of attacks can be generated?

  • Attack library includes over 100 attack types from the latest botnets in the wild

  • Volumetric attack size scalable from 0.1 megabit to 500 gigabits/sec+

  • Layer 7 application attacks for HTTP/HTTPS, DNS, SMTP, IPSEC and more

  • Many randomization and timing parameters

  • Built-in monitoring & analysis for most popular mitigation platforms

  • Multi-protocols: HTTP/HTTPS, TCP, UDP, ICMP, DNS, SMTP, GRE, IPSEC +

  • IPV4 and IPV6

  • Fine grained control over attack sizes, duration, with 'emergency stop'

 

Where do the attacks originate?

  • Agents are distributed globally: North America (East coast, Central, West Coast), South America (Sao Paulo, Goiânia), Europe (London), Asia (Tokyo, Singapore, Koria), Australia (Melbourne, Sydney) and more

  • A global mix of cloud (Amazon, Azure, RackSpace, SoftLayer, HP Cloud, IBM Cloud) ensures realistic global traffic distribution

  • Distributes traffic across many carriers

  • Due to only legal hosts being used no IP spoofing (fake IP's) are used in tests

 

Is it legal and safe?

  • #1 provider of cyber-attack simulation for Fortune 500 companies since 2006

  • 10 years experience testing all major vendors

  • RedWolf only uses dedicated co-located servers (no compromised hosts)

  • Prior to attacks being launched contact information for targets and ISP's must be collected

  • Multi-user real-time web console for command and control

  • Strong role based access control, auditing at multiple levels, and detailed reports

  • Fine grained control over attack sizes, duration with 'emergency stop' butto

How is it priced?

  • Platform access fee + hourly cloud cost based on capacity needed

  • Access to the platform is licensed monthly, quarterly, or yearly

  • Up to 5000 agents can be reserved for larger volumetric attacks

  • Bandwidth utilization can be pre-paid or invoiced at market rates

  • Professional services (attack assistance) and training are available

Copyright 2006-2016 RedWolf Security Incorporated.

  • Wix Twitter page
bottom of page