Question: Setup: Create a Linux VM for installing BoNeSi. Ensure it has network access for downloading necessary files but is isolated from sensitive networks. Follow the
Setup:
Create a Linux VM for installing BoNeSi. Ensure it has network access for downloading necessary files
but is isolated from sensitive networks.
Follow the README instructions from the BoNeSi repository to install dependencies, download
BoNeSi, and build the project.
DDoS Simulation:
Setup another VM as the target of the DDoS attack. Ensure it is in a controlled environment
to avoid unintended impact.
Use VirtualBox's network capture feature to record packets to and from the victim VM
Execute the BoNeSi DDoS attack using the kbots option and target the victim VM
Documentation:
Capture screenshots of the commandline interface showing the build commands for BoNeSi
and the execution of the DDoS attack.
Include details about the setup, such as network configurations, to provide context for the
simulation.
Report Submission:
Combine your findings, screenshots, and analysis into a comprehensive report.
Ensure the report is structured, with clear sections for each subtask and findings.
Review the report for completeness and accuracy before submission
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
