Exploitationvoipfloodiaxudpasteriskdos

iaxflood

iaxflood is a VoIP flooder tool that sends IAX packets to overwhelm Asterisk IP PBX systems. It uses a captured UDP Inter-Asterisk_eXchange packet as payload to force more processing than a basic UDP flood.

Description

iaxflood is designed to perform denial-of-service attacks on VoIP servers, specifically targeting Asterisk IP PBX systems using the IAX protocol. A UDP IAX packet captured from an IAX channel between two Asterisk PBXs serves as the payload source for the flood attack. This approach requires more processing from the target PBX compared to a simple udpflood without IAX-like payload, even if the IAX protocol header does not perfectly match the target.

Use cases include testing the resilience of VoIP infrastructure against flood attacks and demonstrating vulnerabilities in Asterisk-based systems. The tool floods a specified destination from a source IP by sending a defined number of packets to port 4569, the default IAX port.

It is particularly effective because the crafted IAX payload mimics legitimate traffic, potentially bypassing basic flood protections while still consuming significant resources on the target PBX.

How It Works

iaxflood sends UDP packets containing a captured IAX payload to the target destination on port 4569 from the specified source IP and same source port. The tool sets the IP_HDRINCL socket option to include IP headers in the packets. While the IAX protocol header may not match the target Asterisk PBX exactly, the payload requires additional processing, amplifying the impact beyond a generic UDP flood. The number of packets is user-specified, enabling controlled flood intensity.

Installation

bash
sudo apt install iaxflood

Flags

sourcenameSource IP address or hostname from which to send the flood packets
destinationnameDestination IP address or hostname of the VoIP server to flood
numpacketsNumber of packets to send in the flood attack

Examples

Floods the VoIP server at 192.168.1.1 from source 192.168.1.202 by sending 500 IAX packets to port 4569
iaxflood 192.168.1.202 192.168.1.1 500
Sends 100 IAX flood packets from 192.168.1.100 to destination 10.0.0.1
iaxflood 192.168.1.100 10.0.0.1 100
Floods target.example.com from attacker.example.com with 1000 packets using hostnames
iaxflood attacker.example.com target.example.com 1000
Performs a 200-packet IAX flood from 172.16.0.50 to 192.168.1.1
iaxflood 172.16.0.50 192.168.1.1 200
Light flood test sending 50 packets from 192.168.1.202 to 192.168.1.1
iaxflood 192.168.1.202 192.168.1.1 50
Intense flood of 1500 packets from 10.10.10.10 to 10.10.10.1
iaxflood 10.10.10.10 10.10.10.1 1500
Displays usage information: iaxflood sourcename destinationname numpackets
iaxflood -h
Updated 2026-04-16kali.org ↗