DoS attacks with Nmap NSE
The Nmap Scripting Engine (NSE) has numerous scripts that can be used to perform DoS attacks. This specific recipe will demonstrate how to locate DoS NSE scripts, identify the usage of the scripts, and show how to execute them.
Getting ready
To use Nmap NSE to perform DoS attacks, you will need to have a system that is running a vulnerable service addressed by one of the Nmap NSE DoS scripts. In the examples provided, an instance of Windows XP is used for this purpose. For more information on setting up a Windows system, please refer to the Installing Windows Server recipe in Chapter 1, Getting Started, of this book.
How to do it…
Prior to using Nmap NSE scripts to perform DoS testing, we will need to identify what DoS scripts are available. There is a greppable script.db
file in the Nmap NSE script directory that can be used to identify scripts in any given category:
root@KaliLinux:~# grep dos /usr/share/nmap/scripts/script.db | cut -d "\"" -f 2 broadcast-avahi-dos...