Denial of Service: CEH Lab Manual
Denial of Service: CEH Lab Manual
Denial of Service: CEH Lab Manual
Denial of Service
Module 10
Module 10 - Denial of Service
Denial of Service
Denial of Service (DoS) is an attack on a con/pnter or network thatprevents
kgitimate use of its resources.
I C O N K E Y Lab Scenario
Valuable 111 c o m p u tin g , a d en ial-o f-serv ice atta c k (D oS attack) is an a tte m p t to m ak e a
information
m a c h in e o r n e tw o rk re so u rce u n av ailab le to its in te n d e d users. A lth o u g h th e
Test your m e an s to earn* o u t, m o tiv es fo r, an d targ ets o f a D o S attack m ay van*, it
generally co n sists o f th e e ffo rts o f o n e o r m o re p e o p le to te m p o rarily 01־
^ Web exercise indefinitely in te rru p t 01 ־s u sp e n d seiv ices o f a h o s t c o n n e c te d to th e In te rn e t.
Workbook re\ P e rp e tra to rs o f D o S attack s typically ta rg et sites 01 ־seiv ices h o s te d 011 h ig h -
p ro file w eb s e n ־ers su c h as b an k s, c re d it ca rd p a y m e n t gatew ays, a n d ev e n ro o t
n am ese iv ers. T h e te rm is g enerally u se d rela tin g to c o m p u te r n e tw o rk s, b u t is
n o t lim ite d to tins field; fo r ex am p le, it is also u se d 111 re fe re n c e to C P U
re so u rc e m a n ag e m en t.
Lab Objectives
T h e o b jectiv e o f tins lab is to h elp stu d e n ts le arn to p e rfo rm D o S attack s a n d to
te st n e tw o rk fo r D o S flaws.
■ R e m o te ly ad m in ister clients
P e rfo rm a D o S H T T P attack
Lab Duration
Tim e: 60 M inutes
Lab Tasks
P ick an organization that you feel is w o rth y o f your attention. T ins could be an
Overview
educational institution, a com m ercial com pany, o r p erhaps a n o n p ro fit charity.
■ H T T P flooding u sing D o S H T T P
Lab Analysis
A nalyze an d d o cu m en t th e results related to the lab exercise. G ive your o p in io n o n
your target’s security p ostu re an d exposure.
Lab Objectives
T h e o b jectiv e o f tins lab is to h elp stu d e n ts le arn to p e rfo rm d en ial-o f-serv ice
attacks a n d te st th e n e tw o rk fo r D o S flaws.
Lab Duration
T une: 10 M inutes
Overview of hping3
11p111g3 is a n etw o rk to o l able to send cu sto m T C P /I P packets an d to display target
replies like a ping p rogram does w ith IC M P replies. 11p111g3 handles fragm entation,
arbitrary packets body, an d size an d can be used 111 o rd er to transfer hies
encapsulated u n d er su p p o rted protocols.
Lab Tasks
— j
1. L aunch BackTack 5 r3 o n th e virtual m achine.
Flood SYN Packet 2. L aunch die hingp3 utility h o rn th e B ackT rack 5 r3 virtual macliine. Select
BackTrack Menu -> Backtrack -> Information Gathering -> Network
A nalysis -> Identify Live H osts -> Hping3.
^^Applications Places System ( \ rj 3 Sun Oct 21. 1:34 PM
V Accessories
► C<. information Gathering . . . Network Analysis
^ Graphics ► | ^״vulnerability Assessment Web Appl ^ Otrace
^ internet ״-# Exploitation Tools |ףDatabase ^ aiiveo
SB cyftce ► Pnvilege Escalation ^ Wireless ^ alrvefi
Other ► i| Maintaining Access ־, fc; arping .!4 Network ITaffic Analysis
! f , Sound & Vi dec • Reverse Engineering ^ (Jetect*new־ip6
0=5! hping3 is a System Tools ; ן ״RFID Tools ”*b dnmap >n OSIMT Analysis
command-line oriented 9 Wine ► t j Stress Ifcsting ^ fping Route Analysis » !.
T C P /IP packet forensics ^ hplng2 -־K service Fingerprinting
assembler/analyzer. Repotting Tools hpingj
^ netciscovcf
^ netifera
<< back
. nmap
t ^ Pbrj
sctpscan
tiacefi
araceroute
wo»-e
^ zenmap
* * root(afbt: -
File Edit View t r m in a l Help
> sy n set SYN f l a g
t ־־r s t set RST f l a g -
* ־ ־p ush set PUSH f l a g
v ack set ACK f l a g
J ־ ־u rg set URG f l a g
( - ־xnas set X u n u se d f l a g (0 x 4 0 )
f ynas set Y u n u se d f l a g (0 x 8 0 )
■ t c p e x itc o d e u se l a s t tc p - > th f la g s a s e x i t code
tcp -tin e sta T p enable t h e TCP tim e s ta m p o p t i o n to g u e s s t h e H Z /u p tin e
d a ta s iz e (d e fa u lt is 0)
d a ta fro n f i l e
a d d , s ig n a t u r e *
Bum packets in
enoalt pTO'TOrotSR. | 1 \
-u ^ e nd t e l l y o tr v t t t n r e a c h e J EOF a n d p r e v e n t re A in d
•T - • t r a c e r o u t e t r a c e r o u t e mode \ ( I m p l i e s • • b i n d a n d ־ ־t t l 1)
--tr- s to p E x it when r e c e i v e t h e f i r s t n o t ICMP i n t r a c e r o u t e no d e
t r < c ep t t l K eep t h e s o u r c e TTL f i x e d , u s e f u l t o n o n i t o r ] u s t o n e hop
* * tr * n o - rtt D o n 't c a l c u l a t e / s h o w RTT i n f o r m a t i o n i n t r a c e r o u t e node
ARS p a c k e t d e s c r i p t i o n (n ew , u n s t a b l e )
ap d se n d Send t h e p a c k e t d e s c r i b e d w i t h apo ( s e e d o c s /A P O .tx t)
m The hping3
command should be called
with a subcommand as a FIGU RE 1.3: BackTrack 5 r3 11ping3 command
first argument and
additional arguments 5. L i die previous co m m an d , 10.0.0.11 (Windows 7) is d ie victim ’s m aclune
according to die particular
subcommand.
IP address, an d 10.0.0.13 (BackTrack 5 r3) is d ie attack er’s m aclune IP
address.
/v v x root(§bt: -
File Edit View *fenminal Help
״o o t e b t : - # hp1ng3 - s 1 0 . 0 . 0 . 1 1 ■a 1 0 . 0 . 0 . 1 3 •p 22 • ■ f lo o d
HPING 1 0 .0 9 .1 1 (e th O 1 0 . 6 . 0 . 1 1 ) : S s e t , 40 h e a d e r s 0 d a ta
h p in g i n f l o o d n o d e , no r e p l i e s w i l l be shown
<< b a ck tra c k
IBTal 0. <a. 0 1m m m »
m 11ping3 was mainly
used as a security tool in Destination Protocol Length Info
the past. It can be used in
כ. 13 1 0 .0 .0 .1 1 TCP 54 [TCP P e rt n u m b e rs re u s e d ] 5 3 6 2 0 > s s h [S Y N ] 5
many ways by people who כ. 13 54 [TCP P e rt n u m b e rs re u s e d ] 5 3 6 2 1 > s s h [S Y N ] S
don't care for security to נ. 13 1 0 .0 .0 .1 1 TCP 54 [TCP P e rt n u m b e rs re u s e d ] 5 3 6 2 2 > s s h [S Y N ] 5
נ. 13 1 0 .0 .0 .1 1 TCP 54 [TCP P o rt n u m b e rs re u s e d ] 5 3 6 2 3 > s s h [S Y N ] 5
test networks and hosts. A
TCP ■ f f 1 i ־M 7 ־r 3 ^ T T T 1U - t I & Z W W t t 7 M 13771 ■ 3
subset o f the things you 1 0 .0 .0 .1 1 TCP 54 [TCP P o rt n u m b e rs re u s e d ] 5 3 6 2 5 > s s h [S Y N ] 51
1
can do using hping3:
■ Firewall testing
יAdvanced port scanning
יNetwork testing, using
various protocols, TOS,
fragmentation
■ Manual padi MTU | Gl F ra m e 1 : 54 b y t e s o n w i r e ( 4 3 2 b i t s ) , 54 b y t e s c a p t u r e d ( 4 3 2 b i t s ) o n i n t e r f a c e 0
discovery . E t h e r n e t I I , S r c : M ic r o s o f _ a 8 : 7 8 : 0 7 ( 0 0 : 1 5 : 5 d : a 8 : 7 8 : 0 7 ) , D s t : M 'c r o s o f _ a 8 : 7 8 : 0 5 ( 0 0 : 1 5 : 5 d : a
I E in t e r n e t P r o to c o l v e r s io n 4 , s r c : 1 0 .0 .0 . 1 3 ( 1 0 . 0 . 0 . 1 3 ) , D s t: 1 0 .0 .0 . 1 1 ( 1 0 .0 . 0 .1 1 )
■ Advanced traceroute, I j T ra n s m is s io n c o n t r o l P r o t o c o l, s r c P o r t : 11 7 6 6 ( 1 1 7 6 6 ) , D s t P o r t : s s h ( 2 2 ) , s e q : 0 , L e n : 0
under all the supported
protocols
OOOO 00 15 5d as 78 0 5 0 0 15 5d aS 7 8 07 OS 0 0 4 5 0 0 ..] .x ... ] .X ...E .
■ Remote OS 0019 00 28 d l 3a 00 0 0 4 0 06 95 7 e Oa 0 0 0 0 Od Oa 0 0 • (• :..®. .............
0020 0 0 Ob 2d f6 00 1 6 3 a a9 09 f c 6 1 62 d 6 d 7 5 0 02
fingerprinting 0030 02 0 0 ee df 00 00
* Remote uptime guessing
■ T C P /IP stacks auditing O File: *C\Usen\Admin\AppData\Local\Temp... Packets: 119311 Displayed: 119311 Marke... Profile: Default
Lab Analysis
D o c u m e n t all die results gadier during die lab.
I n t e r n e t C o n n e c t io n R e q u ir e d
□ Y es 0 No
P la tf o r m S u p p o r te d
0 C la s s r o o m 0 1L abs
Lab
Lab Objectives
T h e o b jectiv e o f tins lab is to h elp sm d e n ts learn H T T P flo o d in g d em al-o t
service (D oS) attack.
Lab Duration
T im e: 10 M inutes
Overview of DoSHTTP
D o S H T T P is an H T T P Hood denial-of-service (DoS) testing to o l for W indow s. It
includes U R L verification, H T T P redirection, an d p erfo rm an ce m onitoring.
D o S H T T P uses m ultiple asynchronous sockets to p erfo rm an effective H T T P
flood. D o S H T T P can be used sim ultaneously o n m ultiple clients to em ulate a
d istn b u ted den 1al-of-senTice (D D oS) attack. T ins tool is u sed by IT professionals to
test w eb sender perform ance.
Lab Tasks
1. Install an d launch D o S H T T P 111 Windows Server 2 0 1 2 .
3. Click die DoSHttp 2.5 ap p fro m die Start m e n u apps to lau n ch die program .
Start A d m in is tra to r ^
y* D oSHTTP is an easy
* © •
to use and powerful HTTP
Command Notefao*
Flood Denial o f Service Prompt
S
(DoS) Testing Tool for rr־
l
Windows. DoSHTTP
VtmnKtr HypofV Nk «k rwSHTTP
includes URL Verification, WobClcnt
HTTP Redirection, Port
Designation, Performance
% וי ■
T he DoSHTTP m ain screen appears as show n 111 the follow ing figure; 111 diis lab
w e have d em o n strated trial version. Click Try to continue.
X
H DoSHTTP 2 .5 .1 - Socketsoft.net [Loading...]
| File O p tio n s H elp
of-Service I
1
Ready
H nn^HTTP ? S1 - W k p f c n f t n p t [F v a ln a tin n M n r lp ] *1
File Options Help
DoSHTTP
HTTP Flood D enial o f S e rv ic e (D o S ) T esting Tool
Target URL
10.0.0.11
Usei Agent
|Mozilla/6.0 (compatible; MSIE 7.0a; Windows NT 5.2; SV1)
Sockets Requests
1500 ▼| |Continuous ▼
] Verify URL jStart FloodJ Close
Ready
^j"^ptjringfromMicrosofKorporat!onADev!n\NP^605FlD1^2CMEA^A6^E48A8CW2^
File £dit View £0 Capture Analyze Statistics Telephony Tools Internals Help
85 1 4 . 9 4 8 9 0 3 0 D el I _ c 3 : c 3 : c c B ro a d c a s t ARP 42 who h as 1 0 . 0 . 0 . 1 3 ? Te
85 1 5 .4 8 1 0 9 4 0 1 0 . 0 . 0 . 1 0 1 0 .0 .0 .2 5 5 NBNS 92 Name q u e r y NB WPAD<00>
87 1 5 .4 8 1 2 8 0 0 f e 8 0 : : 3 8 a a : 6 3 9 0 : 554 f f 0 2 : : 1 : 3 lln n r 84 s ta n d a rd q u e ry 0 x fe 9 9
83 1 5 .4 8 1 3 2 8 0 1 0 . 0 . 0 . 1 0 2 2 4 .0 .0 .2 5 2 LLNNR 64 s ta rd a rd q u e ry 0 x fe 9 9
89 15. 9 0 1 2 2 7 0 fe 8 0 : :3 8 a a :6 3 9 0 :5 5 4 ff0 2 : :1 :3 LLNNR 84 S ta rd a rd q u e ry 0 x fe 9 9
90 15 90 13 02 0 1 0 .0 .0 . 1 0 2 2 4 .0 .0 .2 5 2 lln n r 64 s ta rd a r d q u e ry 0 x fe 9 9
91 1 5 9 4 9 4 9 7 0 D e 1 1 _ c 3 :c 3 :c c B ro a d c a s t ARP 42 w ho h a s 1 0 . 0 . 0 . 1 3 ? T€
92 16 2313280 1 0 .0 .0 .1 0 1 0 . 0 .0 .2 5 5 NBNS 92 Name q u e r y NB w p a d <00>
93 16 9962120 1 0 .0 .0 .1 0 1 0 . 0 .0 .2 5 5 nbns 92 Name q u e r y NB W PAD<00>.
94 1 7 7 6 7 5 6 0 0 f p 80 : : 38 aa : 6 3 9 0 :5 54 f f 0 ? : :1 7 DHCPv6 157 S o l i c i t XTD: 0 x a QQ84 C
95 18 4 5 4 7 8 0 0 D e l1 _ c 3 :c 3 :c c M ic r o s o f _ a 8 : 7 8 : 0 5 ARP 42 w ho h a s 1 0 . 0 . 0 . 1 1 ? T€
w F ra n e 1: 42 b y te s on w ir e (336 b i t s ) . 42 b y te s c a p tu re d (336 b i t s ) on in t e r f a c e 0
• E t h e r n e t I I , s r c : D e 1 1 _ c 3 :c 3 :c c ( d 4 : b e : d 9 : c 3 : c 3 : c c ) , D s t: B ro a d c a s t ( f f : f f : f f : f f : f f : f f )
ffi A d d rp s s R P * 0 lu t1 0 n P ro to c o l (re q u e s t)
0000 f f f f f f f t f t f f d4 be d9 c3 c 3 c c 0 8 0 6 0 0 0 1
0010 0 8 0 0 06 04 0 0 0 1 d4 b e d9 c3 c 3 c c Oa 0 0 0 0 Oa
0020 0 0 0 0 0 0 0 0 0 0 0 0 Oa 0 0 00 Od
F I G U R E 26: Wireshaik wi n do w
D oSHTTP can be
used simultaneously on 12. Y o u see a lo t o l H T T P packets are flooded to die h o st m achine.
multiple clients to emulate
a Distributed Denial of 13. D o S H T T P uses m ultiple asy nchronous sockets to p erfo rm an H T T P flood
Service (DDoS) attack.
against die entered netw ork.
Lab Analysis
A nalyze an d d o cu m en t die results related to th e lab exercise.
Questions
E valuate h o w D o S H T T P can be used sim ultaneously o n m ultiple clients
an d perfo rm D D o S attacks.
I n t e r n e t C o n n e c t io n R e q u ir e d
□ Y es
P la tf o r m S u p p o r te d
0 C la s s r o o m 0 !Labs