Question: Setup: Create a Linux VM for installing BoNeSi. Ensure it has network access for downloading necessary files but is isolated from sensitive networks. Follow the

Setup:
Create a Linux VM for installing BoNeSi. Ensure it has network access for downloading necessary files
but is isolated from sensitive networks.
Follow the README instructions from the BoNeSi repository to install dependencies, download
BoNeSi, and build the project.
DDoS Simulation:
1. Setup another VM as the target of the DDoS attack. Ensure it is in a controlled environment
to avoid unintended impact.
2. Use VirtualBox's network capture feature to record packets to and from the victim VM.
3. Execute the BoNeSi DDoS attack using the 50k-bots option and target the victim VM.
Documentation:
1. Capture screenshots of the command-line interface showing the build commands for BoNeSi
and the execution of the DDoS attack.
2. Include details about the setup, such as network configurations, to provide context for the
simulation.
Report Submission:
Combine your findings, screenshots, and analysis into a comprehensive report.
Ensure the report is structured, with clear sections for each subtask and findings.
Review the report for completeness and accuracy before submission

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!