ISM Lab 6
ISM Lab 6
01.03.2022 19BEC1385
Experiment – 6
DOS Attack Simulation using HPING3
Aim:
To perform DOS Attack Simulation using HPING3 in kali linux.
THEORY:
DDOS ATTACK and DDOS Attack using HPING 3
HPING 3: Packet traffic tool
DOS:
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network,
making it inaccessible to its intended users. DoS attacks accomplish this by flooding the
target with traffic, or sending it information that triggers a crash.
Ping flood attack relies on ICMP echo ping command which is normally used for testing
network connectivity. In this attack ping is used to flood large amounts of data packets to the
victim’s computer to try to overload the system. Simply block the IP Address from accessing
your network.
SOFTWARE REQUIRED:
Kali Linux
Ubuntu
Commands and outputs:
HPING3 Attack
1. sudo apt-get install hping3 – to install hping3 in kali linux.
2. Find the ip address of both virtual machines and open wireshark in kali
linux.
3. ping <ip of ubuntu> [ping 192.168.29.111] – to ping the ubuntu.
We can see the Wireshark has captured 12 ICMP packet with 6 request and 6
reply packets.
4. Type cd /etc/snort/rules in ubuntu to change the directory.
Type sudo nano local.rules to configure the rules of the snort.
We can see that the packet has been captured in wireshark and alert meassage
has been generated from ubuntu snort.
8. hping3 -1 -c 4 -d 120 <ip of ubuntu> [ hping3 -1 -c 4 -d 120
192.168.1.11 ] – to ping the ubuntu with four ICMP packet of each with a
size of 120 bytes.
We can see that at 2nd line a extra of 120 data bytes has been added.
We can see that our ip address (192.168.1.10) has spoofed with ip address
(192.168.1.50)
14. hping3 -1 –rand-source -c 1 <ip of ubuntu> [ hping3 -1 –rand-source
-c 1 192.168.1.11 ] – to spoof and hide the sender ip address with any
random ip address.
We can see that our ip address (192.168.1.10) has spoofed with random ip
address.
15. hping3 -1 --rand-source –flood <ip of ubuntu> [ hping3 -1 --rand-
source –flood 192.168.1.11 ] – to spoof and hide the sender ip address
with any random ip address and flood the destination ip address.
Syn Flood Attack
1. Find the ip address of metasploitable and open DVWA in ubuntu in
browser.
2. hping -S -c 1 -p 80 <ip of meta> [ hping -S -c 1 -p 80 192.168.1.13 ] –
to perform syn flood attack on metasploitable via port 80 by sending one
TCP packet.
Result:
Thus, performed DOS Attack Simulation using HPING3 in kali linux.