I have a client who has asked us to simulate a DDOS attack on their network during off peak hours (Sunday morning) when there are no staff personnel on site but all computers would be available (about 35 desktops and 4 servers).
I have looked through a number of ethical hacker sources but I have not found a lot of mention of tools to be used. I have looked at Ping of Death with large packets pointing to their external facing IP address and then actively run speed tests (both before and during) to see if it is being flooded. After that we would also review firewall logs to determine activity detected.
Are there any tools that would better simulated a DDOS, performance measurement, logging? Can Spiceworks network monitoring be used for this? Has anyone created any templates to capture and alert sysadmins that thresholds are being...