Steadybit logoResilience Hub
Try SteadybitGitHub icon
Steadybit logoResilience Hub

Package Corruption

Attack

Attack

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Targets:
Hosts
Install now

Package Corruption

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Attack

Attack

Targets:
Hosts
Install now

Package Corruption

Attack

Attack

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Targets:
Hosts
Install now

Package Corruption

Inject corrupt packets by introducing single bit error at a random offset into network traffic.
Attack

Attack

Targets:
Hosts
Install now
Go back to list

Introduction

Inject corrupt packets by introducing single bit error at a random offset into network traffic.

Prerequisites

If you are not using our container images for the agents, you need install the tc (from the iproute2 package) tool to use the attack.

Use Cases

  • Testing network resilience to bit errors

Parameters

ParameterDescriptionDefault
Package CorruptionHow much traffic should be corrupted?15%
DurationHow much of the traffic should be corrupted??30s
HostnameRestrict to which hosts the traffic is corrupted?
IP AddressRestrict to which IP address the traffic is corrupted
Port NumberRestrict to which port number the traffic is corrupted
Network InterfaceTarget Network Interface which should be attackedeth0
Homepage
docs.steadybit.com/quick-start/set-up-agents
MaintainerSteadybit

More Host Actions

See all
Block DNS

Blocks access to DNS servers

Attack

Attack

Hosts

Start using Steadybit for free

Steadybit is free for personal use. Start your journey towards reliability!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Steadybit logoResilience Hub
Try Steadybit
HubActionsTargetsExtensionsRecipes
© 2023 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon