Question: I have a lab to seetup server and attackrt and client in linux and then show the SYN Flooding Attack I need the steps I
I have a lab to seetup server and attackrt and client in linux and then show the SYN Flooding Attack
I need the steps I already have done this so far not sure what to do next

rootmvM: /home/seed licationsPlaces Wireshark Sun 00:20 Error 1006 not converted hint: h errno = 1 = Unknown host le Edit view Scarch Terminal Hel Module options (auxiliaryfdos/tcp/syntlood hint: this is not an IPv6 address: ip root@vM:/home/seed# service apache2 restart root@VM: /home/seed# ifconfig enp@s3 Link encap : Ethernet HWaddr 8: 00 : 27 : 3d : 51: ac Nane Current Setting Required Deseription The name of the inter face Number of SYNS to send (else unlinited) The target address The target port The spoofable sourcc address (clsc rand inet addr:10.0.2.15 Bcast:10.0.2.255 Mask:255.255.2NUM 55 . yes yes RPORT SHOST 80 inet6 addr: fe80: :a87c:e2c3:8046:c5a2/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric:1 RX packets:10 errors:0 dropped:0 overruns:0 frame:0 TX packets:82 errors:0 dropped: 0 overruns:0 carrier:0 TIMEOUT 500 collisions:0 txqueuelen: 1000 RX bytes: 1666 (1.6 KB) TX bytes:8708 (8.7 KB) SNAPLEN 65535 The number ot bytes to capture The source part lelse randnm izes) The number of seconds to wait for new yes es auxiliary dos/tcp/syntlood auxiliary dos/tep/synflood SYN flooding set NUM 8 Link encap: Local Loopback exploit "J 18..2 . 15 : yg pi@rasptery. 05:20 Capturing from etho rruns:0 frame:0 Fle Edit Yiew Ga Capture Analyze Statisties Telephony Bluetoath ATT Server Attributes pi@raspbery File Edit Tabs Halp tcp.port- -80 1I udp port--80 Dluetoath HCISummary Link oncap:Ethernet Hnaddr 0B:00:27:d2:bo:Sd Time Destinatio VLAN Trattic inere adar: teBo::a00:27:ted2:bed G4 Scope:Link RX packets:280 rrors:o dropped:o overruns:o tranie:o T packets:330 rrors:o dropped:o overruns:o carrier: 1074.. 183 O01601951 224.198.147.53 1874. 163.089207330 224.103,14T.53 51 [TCP Part numbers reused] 5A5 54 [TCP PurL nunbers reused] 463 54 ITCP Port nunbers reused] 300 18.0.2.15 TCP RX bytes : 24761 24.1 K1E) TX bytes : 31280 (30.5 K1E) Interrupt: Ease address:0xc020 Link encap:Lccal Loopback 1074. 163-09160 aUG 224 . 199 . 147 . 53 12B Scope:Host Tdentificatian: x18b1 (6324) UP LOOPBACK RUNNING MITU: G553G Metric: 1 RX packets:200 crrors:D dropped:0 averruns:0 traic:o Tpackets:200 crrors:0 dropped:o averruns:0 corrier: Time to live: 243 Prat tol: TCP ) RX bytes: 16056
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
