Lab
In this lab we will be performing a DoS attack on the Windows Metaspliotable machine and perform an analysis of a packet capture (PCAP) file.
Exercise 1
In this exercise, we are going to perform a DoS attack on our Windows system with a SYN flood:
- Boot both Kali Linux and your Windows Metasploitable.
- Log in into your Windows machine and open Task Manager.
- You can do this by right-clicking on the bar at the bottom of the screen to the right of the Start button:
Figure 9.17 – Opening Task Manager on a Windows Metasploitable machine
- Once loaded, click the Networking tab to display the network traffic graph.
- Now, return to Kali and log in to perform the attack.
- Open a command prompt and enter the following command:
sudo hping3 -c 15000 -d 500 -S -w 64 -p 80 --flood --rand-source 192.168.255.2
What this does is load an application called hping3, which is a packet generator. Next, we pass in the parameters...