{"title":"以Metasploit发起SYN Flood攻击为例","authors":"Ng Kar Zuin, Eugene, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.065","DOIUrl":null,"url":null,"abstract":"There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Case Study: SYN Flood Attack Launched Through Metasploit\",\"authors\":\"Ng Kar Zuin, Eugene, Vinesha Selvarajah\",\"doi\":\"10.2991/ahis.k.210913.065\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.\",\"PeriodicalId\":417648,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2991/ahis.k.210913.065\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2991/ahis.k.210913.065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Case Study: SYN Flood Attack Launched Through Metasploit
There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.