DoS cheat sheet
SYN Flooding
SYN flooding takes advantage of a flaw with regard to how most hosts implement the TCP three-way handshake. This attack occurs when the intruder sends unlimited SYN packets (requests) to the host system. The process of transmitting such packets is faster than the system can handle. Normally, the connection establishes with the TCP three-way handshake, and the host keeps track of the partially open connections while waiting in a listening queue for response ACK packets.
Using Metasploit
PoD attack
The attacker tries to crash, freeze, or destabilize the targeted system or service by sending malformed or oversized packets using a simple ping command.
Using hping3
-d: Specifies data size.-S: Sets the SYN flag.
-p: Specifies the destination port.
--flood: Sends a huge number of packets.
Spoof source IP
Using hping3
-S: Sets the SYN flag.-a: Spoofs the IP address.
-p: Specifies the destination port.
--flood: Sends a huge number of packets.
UDP application layer flood attack
Using hping3
-2: Specifies the UDP mode.-p: Specifies the destination port.