Experiment No 7: Aim Theory: Denial-of-Service (Dos)
Experiment No 7: Aim Theory: Denial-of-Service (Dos)
Theory:
Denial-of-Service(Dos):
Denial-of-service (DoS) attack is an attempt to make a machine or network
resource unavailable to its intended users, such as to temporarily or indefinitely
interrupt or suspend services. A distributed denial-of-service (DDoS) is where the
attack source is more than one, often thousands of, unique IP addresses. It is
analogous to a group of people crowding the entry door or gate to a shop or
business, and not letting legitimate parties enter into the shop or business,
disrupting normal operations.
A DoS attack tries to make a web resource unavailable to its users by flooding the
target URL with more requests than the server can handle. That means that during
the attack period, regular traffic on the website will be either slowed down or
completely interrupted.
Hping3:
hping is a free packet generator and analyzer for the TCP/IP protocol . It is a one type of tester for
network security. It is one of the de facto tools for security auditing and testing of firewalls and
networks, and was used to exploit the idle scan scanning technique (also invented by the hping
author), and now implemented in the Nmap Security Scanner. The new version of hping, hping3, is
scriptable using the Tcl language and implements an engine for string based, human readable
description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP
packet manipulation and analysis in very short time.
Installation Steps:
Install Hping3 and wireshark
1. Flood the victim with TCP/ICMP/UDP packet using Hping3 (-- flood option)
2. Observe the Dos attack and DDos attack using Wireshark
Conclusion:
DoS attacks affect availability of resources. DoS attack is simulated using Hping3
and resources are monitored using wireshark.
Output: