hping3 -- SYN flood attack


Step 1: use reconnaissance to find victim. I use zenmap to find the victim, it's my boyfriend. 😆.


24 means find all the subnet in the segment.
This is equal to the command: nmap -T4 -A -v 192.168.3.16/24


I found there are two apple machines, one is his, the other is mine. 


His IP is 192.168.3.11

Step 2: do SYN flood attack with hping3 



We’re sending 15000 packets (-c 15000) at a size of 120 bytes (-d 120) each. We’re specifying that the SYN Flag (-S) should be enabled, with a TCP window size of 64 (-w 64). To direct the attack to our victum’s HTTP web server we specify port 80 (-p 80) and use the --flood flag to send packets as fast as possible. As you’d expect, the --rand-source flag generates spoofed IP addresses to disguise the real source and avoid detection but at the same time stop the victim’s SYN-ACK reply packets from reaching the attacker.



Step 3: check the result 





He is going to kill me.😈


Popular posts from this blog

Phonebook - Hack the box Write up -- Web LDAP injection

wafwaf -- Hack The Box -- Web SQL injection

Cheat sheet for security+