hping3-synflood攻击

SYN Flood是一种广为人知的DoS(拒绝服务攻击)与DDoS(分布式拒绝服务攻击)的方式之一,这是一种利用TCP协议缺陷,发送大量伪造的TCP连接请求,从而使得被攻击方资源耗尽(CPU满负荷或内存不足)的攻击方式。 

攻击系统:KALI LINUX 192.168.2.66

被攻击系统:debain

操作步骤:

1、下载源码包:

wget http://www.hping.org/hping3-20051105.tar.gz

2、编译安装:

tar -zvxf hping3-20051105.tar.gz

cd hping3-20051105

./config

出现如下错误提示:

can not find the byte order for this architecture, fix bytesex.h

需要修改bytesex.h如下:

#ifndef ARS_BYTESEX_H

#define ARS_BYTESEX_H

#if     defined(__i386__) \

|| defined(__x86_64__) \

        || defined(__alpha__) \

        || (defined(__mips__) && (defined(MIPSEL) || defined (__MIPSEL__)))

#define BYTE_ORDER_LITTLE_ENDIAN

#elif   defined(__mc68000__) \

        || defined (__sparc__) \

        || defined (__sparc) \

        || defined (__PPC__) \

        || defined (__BIG_ENDIAN__) \

        || (defined(__mips__) && (defined(MIPSEB) || defined (__MIPSEB__)))

#define BYTE_ORDER_BIG_ENDIAN

#else

# error can not find the byte order for this architecture, fix bytesex.h

#endif

#endif /* ARS_BYTESEX_H */

3、再次编译,./config

提示没有pcap.h,安装libpcap-dev:apt-get install libpcap-dev,运行make, 提示没有头文件net/bpf.h,拒绝办法:ln -sf /usr/include/pcap-bpf.h /usr/include/net/bpf.h

运行make,出现问题:/usr/bin/ld: cannot find -ltcl,解决办法:apt-get insatll tcl-dev

之后根据提示进行如下三步操作:

1)make strip

2)./hping 3

3) make install

cp -f hping3 /usr/sbin/
chmod 755 /usr/sbin/hping3
ln -s /usr/sbin/hping3 /usr/sbin/hping
ln -s /usr/sbin/hping3 /usr/sbin/hping2
@@@@@@ WARNING @@@@@@
Can't install the man page: /usr/local/man/man8 does not exist

4、扫描端口

在kali linux终端运行:nmap -sS -Pn 192.168.2.166

Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-11-24 23:06 CST
Nmap scan report for 192.168.2.166
Host is up (0.00016s latency).
Not shown: 997 closed ports
PORT     STATE SERVICE
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
6000/tcp open  X11
MAC Address: B8:AE:ED:96:4C:5C (Elitegroup Computer Systems Co.)

Nmap done: 1 IP address (1 host up) scanned in 1.62 seconds

5、 攻击测试

hping 182.168.2.166 -p  139 -S

预期结果在攻击主机查看:

sudo tcpdump dst 192.168.2.66

你可能感兴趣的:(软件测试-网络安全)