Results 1 to 2 of 2

Thread: Setting up test environment for syn flood attack.

  1. #1
    Join Date
    2020-May
    Posts
    1

    Setting up test environment for syn flood attack.

    Hello,


    I'm currently working on a school project - where i wan't to document and test either Hping3 or the "syn flood" auxiliary in Kali Linux.
    I've setup a test environment in VMware - with Kali Linux as the attacker, and Ubuntu 20.05 Server running XAMMP as the target.
    Whenever i hit the target with the attack, it seems to work just fine - but the Ubuntu server seems to have all security configurations in place to handle such an attack..
    I've then tried to disable Syncookies and syncache, to see whether this affect the impact of the attack. But Ubuntu still seems to be able to handle the attack, without the XAAMP server is affected.
    This is what Hping3 reports when the attack is stopped:
    10299536 packets transmitted, 0 packets received, 100% packets loss
    This is what Ubuntu reports when using "tcpdump -i enp0s3 'Port 80':
    1067 packets captured
    177603 packets received by filter
    176536 packets droppet by kernel

    Am i missing something?
    Or is there any way i can run a more vulnerable VM, and then afterwards implement various security features, to measure their affect on the attacks?

  2. #2
    Join Date
    2020-May
    Posts
    2
    hi, what is the hping3 syntax being used?
    Can you use TOP or netstat, or some such utility to see what is happening?

Similar Threads

  1. Problems with MDK3 flood
    By gudipati in forum General Archive
    Replies: 1
    Last Post: 2016-02-13, 03:25
  2. WPS Pixie Dust Attack (Offline WPS Attack)
    By soxrok2212 in forum General Archive
    Replies: 353
    Last Post: 2015-05-05, 08:32

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •