0% found this document useful (0 votes)
129 views4 pages

Pranil - CSA - Lab Assignment 3

This document describes how to simulate a DDoS attack. It defines DDoS and DoS attacks, lists common DoS attack tools like Nemesy and Panther, and describes how to protect against attacks using firewalls and intrusion detection. It then provides the procedure to simulate a ping of death attack against a target IP address using infinite ping packets from the command line. Screenshots of the command line and task manager are included.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views4 pages

Pranil - CSA - Lab Assignment 3

This document describes how to simulate a DDoS attack. It defines DDoS and DoS attacks, lists common DoS attack tools like Nemesy and Panther, and describes how to protect against attacks using firewalls and intrusion detection. It then provides the procedure to simulate a ping of death attack against a target IP address using infinite ping packets from the command line. Screenshots of the command line and task manager are included.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

D Y Patil International University

School of Computer Science, Engineering, and ApplicationsAcademic


Year 2022-2023
Practical Assignment No. 3

Class: MCA-SEM II Subject: Cyber Security and ApplicationsDate


02 / 03/2023
Name : Pranil Choudhari
PRN : 20220804036

Experiment 3: DdoS Attack simulation

a. To generate, capture and analyze DoS and DDoS-centric Network Traffic

Aim: - To generate, capture and analyse DoS and DDoS-centric


Network Traffic.

DoS Attack:
• DoS is an attack used to deny legitimate users access to a
resource such as accessing a website, network, emails, etc. or
making it extremely slow.
• DoS is the acronym for Denial of Service. This type of attack is
usually implemented by hitting the target resource such as a web
server with too many requests at the same time.
• This results in the server failing to respond to all the requests.
• The effect of this can either be crashing the servers or slowing
them down.
DoS Attack Tools:

Following are the tools to perform DoS attacks-

• Nemesy: This tool can be used to generate random packets. It


works on Windows. Due to nature of program, it is considered
as virus on antivirus.
• Land and LaTierra: This tool can be used for IP spoofing
opening TCP connections.
• Panther: This tool can be used to flood a victim’s network
UDP packets.
• Botnets: These are multitudes of compromised computers on
the Interned that can be used to perform a Distributed Denial
of Service Attack.

DoS Protection: Prevent an attack

• Attacks such as SYN flooding take advantage of bugs in the


operating system. Installing security patches can help reduce
the chances of such attacks.
• Intrusion detection systems can also be used to identify and
even stop illegal activities.
• Firewalls can be used to stop simple DoS attacks by blocking
all traffic coming from an attacker by identifying his IP.
• Routers can be configured via the Access Control List to limit
access to the network and drop suspected illegal traffic.
Procedure:

• Open the command prompt on the target computer.


• Enter the command ipconfig.
• Switch to the computer that you want to use for the attack
and open the command prompt.
• We will ping our victim computer with infinite data packets of
65500.
• Then enter the following command ‘ping 10.128.131.108 –t -
l 65500’.
• HERE,
o ‘ping’ sends the data packets to the victim.
o ‘10.128.131.108’ is the IP address of the victim.
o ‘-t’ means the data packets should be sent until the
program is stopped.
o ‘-l’ specifies the data load to be sent to the victim.

Output Screenshot:

1. Ping of Death (Using CMD)

a. CMD Screenshot
b. Task Manager Screenshot

Summary

• A denial of service attack’s intent is to deny legitimate users


access to a resource such as a network, server etc.
• There are two types of attacks, denial of service and
distributeddenial of service.
• A denial of service attack can be carried out using SYN
Flooding,Ping of Death, Teardrop, Smurf or buffer overflow
• Security patches for operating systems, router configuration,
firewalls and intrusion detection systems can be used to
protectagainst denial of service attacks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy