Lab: Denial of Service Attack Aiti-Kace, Nis August, 2017
Lab: Denial of Service Attack Aiti-Kace, Nis August, 2017
AITI-KACE, NIS
August, 2017
0 The Lab
0.1 Objectives
In this Lab you are asked to perform a denial of service (DoS) attack. A common technique
to performing DoS is by simply flooding the server or network gateway of your target with a
high volume of packets than it can process. Other ways to denial service to hosts can be
done by getting a position in the middle of a conversation (man-in-the-middle) to delete
frames sent by your target to the AP as you did already in the previous Lab or you can
accomplish a DoS task by jamming.
In this Lab, you are asked to flood your target’s web server or gateway with packets than it
can handle to denial service to your target or make the server respond slowly.
0.2 Tools
A PC running kali can perform the task in this lab, or you can install the Hping3 tool in
Ubuntu.
The Hping3 tool is one of the most utilized pen testing tools. Hping3 is good for:
- Network probing
- Ping sweep
- Firewall rules testing
- Testing intrusion detection systems
- IP spoofing
- DoS
Benchmark:
After flooding your target’s web server’s gateway, you will have to know the performance of
the gateway if it is indeed responding slowly to your target or it is completely out of service.
To check that, you can use the round trip time (RTT) of a ping request to the target gateway.
You can ping the target before flooding and analyse the RTT and ping once more after
flooding to compare the RTTs.
Try the attack with more than one system (DDoS) and compare the results of the responds
rate of the victim gateway after the attack.