Jump to content
zbeng

DOS with hping2

Recommended Posts

We all know hping as a network scanning tool and analyzer. In this article I use it as a DOS tool…pretty simple. First off open tcpdump so you can monitor what is going on. Then I format the command for the attack which looks like this:

exploit2:/Users/sting3r root# hping2 -a 192.168.2.126 -S 192.168.2.115 -p 80 -i u10000

In the command youll notice the -a switch which is used to spoof the source address. My curent IP at the time of the attack was 192.168.2.192. This also eliminates the possibility of getting the RST packet from the targeted host. The -i switch dictates the packet interval. Now understand you will not see an of the return traffic to your machine because of the -a spoof source switch.

In the screen shot you can see the traffic between the spoofed source and the target….this is a pretty basic attack and can be mitigated.

nou.jpg

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...