Monday, May 5, 2014

DOS using hping3 with random source IP on Kali Linux

Read full details here: DOS using hping3 with random source IP on Kali Linux

DOS using hping3 with random source IP on Kali Linux


Let’s face it, you installed Kali Linux to learn how to DOS, how to crack into your neighbors Wireless router, how to hack into a remote Windows machine be that a Windows 2008 R2 server or Windows 7 or learn how to hack a website using SQL Injection. There’s lot’s of guide that explain it all. In this guide, I am about to demonstrate how to DOS using hping3 with random source IP on Kali Linux. That means,
  1. You are executing a Denial of Service attack or DOS using hping3
  2. You are hiding your a$$ (I meant your source IP address).
  3. Your destination machine will see source from random source IP addresses than yours (IP masquerading)
  4. Your destination machine will get overwhelmed within 5 minutes and stop responding.
Sounds good? I bet it does. But before we go and start using hping3, let’s just go over the basics..

What’s hping3?

hping3 is a free packet generator and analyzer for the TCP/IP protocol. Hping is one of the de-facto tools for security auditing and testing of firewalls and networks, and was used to exploit the Idle Scan scanning technique now implemented in the Nmap port scanner. The new version of hping, hping3, is scriptable using the Tcl language and implements an engine for string based, human readable description of TCP/IP packets, so that the programmer can write scripts related to low level TCP/IP packet manipulation and analysis in a very short time.
Like most tools used in computer security, hping3 is useful to security experts, but there are a lot of applications related to network testing and system administration.


hping3 should be used to…

  • Traceroute/ping/probe hosts behind a firewall that blocks attempts using the standard utilities.
  • Perform the idle scan (now implemented in nmap with an easy user interface).
  • Test firewalling rules.
  • Test IDSes.
  • Exploit known vulnerabilties of TCP/IP stacks.
  • Networking research.
  • Learn TCP/IP (hping was used in networking courses AFAIK).
  • Write real applications related to TCP/IP testing and security.
  • Automated firewalling tests.
  • Proof of concept exploits.
  • Networking and security research when there is the need to emulate complex TCP/IP behaviour.
  • Prototype IDS systems.
  • Simple to use networking utilities with Tk interface.

hping3 is pre-installed on Kali Linux like many other tools. It is quite useful and I will demonstrate it’s usage soon.

My setup

I have two machines. The first one is my attacking machines and the second one is my target machine.

Attacking Machine

I have freshly installed Kali Linux 1.0.6 64-bit running on a VirtualBox with internal networking setup. You can use NAT/Bridge or any types of setup you feel like. You can also use VMWare if you have a license for it.

Target Machine

I am running Linux Mint Debian edition (LMDE) version 16 64-bit on my target machine. Similar to my attacking machine, this one is also virtualized running on a VirtualBox with internal networking setup. You can again using VMWare or physical installation if you want to.
I’ve tested this with Windows 7, Linux Mint, Windows server 2008 R2, Kali Linux, CentOS 6.4 and Ubuntu. All the target machines became completely unusable or unresponsive within 5 minutes. It made no difference whether the target machine was 64-bit or 32-bit, the results were conclusive. After 5 minutes attack from a single source/attacking machine, their TPC stack was almost full and I could hardly move my mouse in them.


Read the rest of it here: DOS using hping3 with random source IP on Kali Linux

No comments:

Post a Comment