0% found this document useful (0 votes)
31 views2 pages

Lab: Denial of Service Attack Aiti-Kace, Nis August, 2017

This document discusses using hping3 to perform a denial of service (DoS) attack against a target's web server or gateway. It describes how hping3 can be used to flood the target with packets to overwhelm its processing ability. The document provides commands for launching SYN flood attacks with hping3 to perform the DoS, including options to spoof the source IP address. It also recommends using ping to check the round trip time before and after the attack to analyze if the target is responding slowly or unavailable due to being flooded.

Uploaded by

Areef
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Lab: Denial of Service Attack Aiti-Kace, Nis August, 2017

This document discusses using hping3 to perform a denial of service (DoS) attack against a target's web server or gateway. It describes how hping3 can be used to flood the target with packets to overwhelm its processing ability. The document provides commands for launching SYN flood attacks with hping3 to perform the DoS, including options to spoof the source IP address. It also recommends using ping to check the round trip time before and after the attack to analyze if the target is responding slowly or unavailable due to being flooded.

Uploaded by

Areef
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Lab: Denial of service attack

AITI-KACE, NIS
August, 2017

0 The Lab
0.1 Objectives

In this Lab you are asked to perform a denial of service (DoS) attack. A common technique
to performing DoS is by simply flooding the server or network gateway of your target with a
high volume of packets than it can process. Other ways to denial service to hosts can be
done by getting a position in the middle of a conversation (man-in-the-middle) to delete
frames sent by your target to the AP as you did already in the previous Lab or you can
accomplish a DoS task by jamming.
In this Lab, you are asked to flood your target’s web server or gateway with packets than it
can handle to denial service to your target or make the server respond slowly.

0.2 Tools

A PC running kali can perform the task in this lab, or you can install the Hping3 tool in
Ubuntu.

1 DoS with HPING3

The Hping3 tool is one of the most utilized pen testing tools. Hping3 is good for:
- Network probing
- Ping sweep
- Firewall rules testing
- Testing intrusion detection systems
- IP spoofing
- DoS

Hping3 is preinstalled in kali.


Use command hping3 –help for the different options with the tool.

Benchmark:
After flooding your target’s web server’s gateway, you will have to know the performance of
the gateway if it is indeed responding slowly to your target or it is completely out of service.
To check that, you can use the round trip time (RTT) of a ping request to the target gateway.
You can ping the target before flooding and analyse the RTT and ping once more after
flooding to compare the RTTs.

SYN flood DoS:

Hping3 –S --flood –V <target_Gateway_IP_or_domain_name>

SYN flood DoS:

Hping3 –S --flood –V <target_Gateway_IP_or_domain_name>

SYN flood with spoofed IP

Hping3 –S --flood –V <target_Gateway_IP_or_domain_name> --rand=source

Try the attack with more than one system (DDoS) and compare the results of the responds
rate of the victim gateway after the attack.

You might also like