A Case Study: SYN Flood Attack Launched Through Metasploit

Ng Kar Zuin, Eugene, Vinesha Selvarajah
{"title":"A Case Study: SYN Flood Attack Launched Through Metasploit","authors":"Ng Kar Zuin, Eugene, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.065","DOIUrl":null,"url":null,"abstract":"There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2991/ahis.k.210913.065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.
以Metasploit发起SYN Flood攻击为例
有许多不同类型的拒绝服务攻击,如Ping洪水攻击和ICMP洪水攻击,但本案例研究是关于拒绝服务SYN洪水攻击,它向受害者机器发送SYN数据包,导致受害者机器性能变慢。在本案例研究中,Kali Linux机器被用作虚拟机,并充当攻击受害者机器的攻击者,而受害者机器使用的是Windows 2008。Kali Linux是一个众所周知的操作系统,被不道德和有道德的黑客用来对受害者进行攻击或进行渗透测试。在Kali Linux中使用了一个工具来执行SYN flood攻击,这个工具是Metasploit框架,这也是一个众所周知的渗透测试框架,目前被所有专业的道德黑客和不道德的黑客使用,因为它更容易使用,它是一个命令行界面,与图形用户界面的工具相比,它更专业。如果黑客知道受害机器的IP地址,并将所有SYN包发送到受害机器,使受害机器陷入瘫痪,就可以很容易地发动SYN flood攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信