CEH

(Jeff_L) #1

266 Chapter 11 ■ Denial of Service



  1. Don’t let all the options overwhelm you. You’re interested in only a few for this exercise.
    In the command syntax shown here, you use hping3 to flood SYN packets to port 80 on
    I P 19 2.16 8 .1. 2.


Note how logical the syntax is in the hping3 utility. Use what you know as
clues for what a command means or is intended to do. For example, use -p
for port since 80 is a common port, and use –S as a SYN flag indicator using
the context clue of the –flood option.


  1. Next, you’ll execute the command and capture the traffic to see the effects. Notice the
    CPU usage of 100% in the Task Manager window. The background Wireshark applica-
    tion, which is frozen, has nothing but SYN requests coming in.

  2. Go back to your BackTrack terminal window and terminate the command. Notice how
    many packets have been sent out in a short period of time. Are you wondering why
    there were no replies?

Free download pdf