DDoS Attack Explained | How to Perform DOS Attack | Ethical Hacking and Penetration Testing

COMET TECHZONE
23 Jan 202208:17

Summary

TLDRIn this educational video, the presenter demonstrates a Distributed Denial of Service (DDoS) attack using a Windows Server 2019 configured as a web server with an IP address of 10.10.10.8. They begin by showing the server's stable performance metrics, then proceed to illustrate the attack's impact by sending continuous ping commands with increased packet sizes. The video explains how attackers can coordinate from multiple devices or use botnets to overwhelm targets. It also touches on the difficulty of identifying the source of such attacks and mentions alternative attack vectors like SYN flooding, using tools like hping3 to simulate the attack and demonstrate its potential to disrupt server performance.

Takeaways

  • πŸ’» The video demonstrates a DDoS attack on a Windows Server 2019 configured as a web server with IIS.
  • 🌐 The server's IP address is 10.10.10.8, and it shows stable performance with low CPU and memory utilization before the attack.
  • πŸ“ˆ A simple ping command can be used to launch a DDoS attack by sending continuous pings with large packet sizes.
  • πŸ” The ping command uses ICMP protocol, which might be blocked by firewalls, prompting attackers to find alternative methods.
  • πŸ€– Botnets can be used to amplify DDoS attacks by coordinating multiple devices to target a single IP address.
  • πŸ”Ž Identifying the perpetrator of a DDoS attack can be challenging, especially when botnets are involved.
  • πŸš€ SYN flooding is a type of DDoS attack that overwhelms a server by sending numerous SYN packets to establish connections.
  • πŸ› οΈ hping3 is a tool used to perform SYN flooding attacks, which can be executed from the Kali Linux operating system.
  • πŸ“Š The video shows how SYN flooding can cause a significant spike in network and CPU utilization, potentially taking down a server.
  • πŸ‘₯ DDoS attacks are often carried out by groups of attackers targeting a single IP to maximize the impact and overwhelm the target's resources.

Q & A

  • What is the main topic of the video?

    -The main topic of the video is a demonstration of a Distributed Denial of Service (DDoS) attack.

  • What server is used for the demonstration?

    -A Windows Server 2019 configured as a web server running with IIS is used for the demonstration.

  • What is the IP address of the machine used in the demonstration?

    -The IP address of the machine used in the demonstration is 10.10.10.8.

  • What was the initial CPU utilization percentage of the server before the attack?

    -The initial CPU utilization percentage of the server was between 5% and 7%.

  • What was the initial network utilization before the attack?

    -The initial network utilization was very low, as indicated by the script.

  • How is a simple ping command used to demonstrate an attack?

    -A simple ping command is used to demonstrate an attack by producing continuous pings with the -t option and increasing the packet size to the maximum supported by the ping command.

  • What is the purpose of using a large packet size in the ping command?

    -Using a large packet size in the ping command is intended to increase the network traffic and potentially overwhelm the target's network resources.

  • What is the significance of the attackers using multiple devices to launch an attack?

    -Using multiple devices to launch an attack amplifies the impact and makes it more difficult for the target to mitigate the attack, as it simulates a larger number of legitimate users or systems.

  • What is a botnet and how is it related to DDoS attacks?

    -A botnet is a network of compromised devices that can be remotely controlled to perform actions, such as launching DDoS attacks, by sending commands to all devices in the network simultaneously.

  • Why is it challenging to find the real perpetrator of a botnet-based DDoS attack?

    -It is challenging to find the real perpetrator of a botnet-based DDoS attack because the attack is distributed across many devices, often without the knowledge of their owners, making it difficult to trace back to the original attacker.

  • What is a SYN flood attack and how does it work?

    -A SYN flood attack is a type of DDoS attack where an attacker sends a large number of SYN packets to the target, causing the target to exhaust its resources in attempting to establish connections, thereby denying service to legitimate users.

  • What tool is mentioned in the script for performing a SYN flood attack?

    -The tool mentioned for performing a SYN flood attack is hping3, which is commonly used in Kali Linux operating system.

  • How does increasing the packet size in a SYN flood attack affect the target?

    -Increasing the packet size in a SYN flood attack can consume more resources on the target, potentially causing a greater impact on the network and system performance.

Outlines

00:00

🌐 Demonstration of a DDoS Attack

This paragraph introduces a video demonstration on DDoS (Distributed Denial of Service) attacks. The presenter has set up a Windows Server 2019 with IIS to act as a web server, with an IP address of 10.10.10.8. The server's performance is stable, with CPU and memory utilization at 5-7% and 65% respectively, and minimal network utilization. The demonstration proceeds with a simple ping command to show how even a basic command can be used to launch an attack. The presenter increases the packet size to the maximum supported by ping, which is 65500 bytes, to simulate a high volume of traffic. The video explains that while a single computer's attack might not be significant, attackers often use multiple devices or botnets to overwhelm the target, making it difficult for forensic investigators to trace the real attacker. The paragraph concludes by mentioning that while ICMP (Internet Control Message Protocol) packets used by ping might be blocked by firewalls, attackers can still use other methods to launch attacks, such as targeting specific ports like 80 or 443.

05:01

πŸ›‘ Exploring SYN Flooding in DDoS Attacks

The second paragraph delves into a specific type of DDoS attack known as SYN flooding. SYN packets are part of the TCP handshake process used to establish a connection. The video demonstrates how an attacker can flood a target with SYN packets, causing the target's resources to be consumed as it tries to manage the half-open connections. The tool used for this demonstration is hping3, a popular tool in Kali Linux, which allows the specification of packet size, number of packets, and the type of attack (in this case, SYN flooding). The presenter targets port 80, which is commonly used for web traffic, and shows how the network traffic and CPU utilization spike significantly during the attack. The video concludes by emphasizing that successful DDoS attacks often require a substantial amount of resources, which is why attackers often collaborate in groups to target a single IP. The paragraph ends with a teaser for upcoming videos that will cover more topics related to DDoS attacks.

Mindmap

Keywords

πŸ’‘DDoS Attack

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic. In the video, the demonstration of a DDoS attack is central to the theme, illustrating how a web server running on Windows Server 2019 with IIS can be targeted. The script describes how attackers can use multiple devices or botnets to overwhelm the target, making it difficult for legitimate users to access the service.

πŸ’‘Windows Server 2019

Windows Server 2019 is an operating system designed for enterprise environments. In the context of the video, it is used as a web server to demonstrate the vulnerability of such systems to DDoS attacks. The script mentions configuring this server to act as a web server, highlighting its role in the practical demonstration of an attack.

πŸ’‘IIS

IIS, or Internet Information Services, is a web server software developed by Microsoft for use with Windows operating systems. The script notes that the Windows Server 2019 is running with IIS, emphasizing its function as a web server that can be targeted in a DDoS attack.

πŸ’‘IP Address

An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. In the video script, the IP address of the machine (10.10.10.8) is mentioned as the target for the DDoS attack, demonstrating how attackers would identify and target a specific server.

πŸ’‘CPU Utilization

CPU utilization refers to the percentage of time during which a processor is busy executing a process or processes. The script mentions the CPU utilization of the server being stable at around 5-7% before the attack, indicating the server's performance baseline which is crucial for understanding the impact of the DDoS attack.

πŸ’‘Memory Utilization

Memory utilization is the measure of how much of a computer's RAM is currently in use. In the script, it is noted that the server's memory utilization is at 65%, providing a performance metric that can be affected by the DDoS attack, as high memory usage can lead to system slowdowns or crashes.

πŸ’‘Network Utilization

Network utilization refers to the amount of data being sent and received over a network. The script describes the network utilization as 'very little' before the attack, which is a key indicator of the server's normal operation. During the attack, the script notes a significant increase in network utilization, illustrating the attack's impact on network traffic.

πŸ’‘Ping Command

The ping command is a network administration tool used to test the reachability of a host on an Internet Protocol (IP) network. In the video, the script explains how a simple ping command can be used to initiate a DDoS attack by sending continuous pings with increased packet size, demonstrating the simplicity of the tools used in such attacks.

πŸ’‘ICMP Protocol

The Internet Control Message Protocol (ICMP) is a protocol used by network devices to send error messages and operational information. The script mentions that the ping command uses ICMP, which is significant because some organizations block ICMP in their firewalls to prevent certain types of DDoS attacks.

πŸ’‘Botnet

A botnet is a network of private computers infected with malware and controlled as a group without the owners' knowledge. In the context of the video, the script describes how attackers can use botnets to launch DDoS attacks from multiple devices simultaneously, making it difficult to trace the attack back to a single source.

πŸ’‘SYN Flooding

SYN flooding is a type of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in order to consume its resources. The script explains how SYN flooding can be used in a DDoS attack, with the attacker sending many SYN packets to the target, overwhelming it and causing a denial of service.

πŸ’‘hping3

hping3 is a network tool used to send custom TCP/IP packets. The script mentions using hping3 to perform a SYN flooding attack, demonstrating how specific tools can be employed to carry out different types of DDoS attacks. It is a powerful utility in the context of network security testing and is often used in penetration testing.

Highlights

Introduction to a practical demonstration of a DDoS attack.

Use of Windows Server 2019 configured as a web server with IIS.

IP address of the web server is 10.10.10.8.

Performance metrics of the web server show stable CPU and memory utilization.

Demonstration of how a simple ping command can be used to launch an attack.

Explanation of the impact of continuous ping commands on network traffic.

The concept of attackers launching attacks from multiple devices simultaneously.

Discussion on the difficulty of attributing blame in botnet-based DDoS attacks.

Mention of the 'Ping of Death' attack and its limitations due to firewalls blocking ICMP.

Introduction to SYN flooding as a method of DDoS attack.

Explanation of the role of the SYN flag in TCP connection establishment.

Use of hping3 tool for performing SYN flooding attacks.

Command structure for hping3 to target a specific port with SYN packets.

Observation of resource consumption on the target during SYN flooding.

Impact of increasing packet size on the effectiveness of the attack.

Conclusion on the necessity of substantial resources for successful DDoS attacks.

Overview of how attackers coordinate group efforts to bring down targets.

Closing remarks andι’„ε‘Š of upcoming videos on related topics.

Transcripts

play00:00

welcome back so in this video we will

play00:02

discuss on the ddos attack

play00:05

so we'll see the practical demonstration

play00:07

on the ddos attack

play00:10

so here for this demonstration i have a

play00:13

web server or have configured this

play00:15

windows server 2019 as a web server it

play00:17

is running with iis

play00:19

and

play00:20

i'll also

play00:22

note down the ip errors of this machine

play00:28

so this machine's ips for 10.10.10.8

play00:33

and also i'd like to check the

play00:37

performance of this machine so the

play00:39

performance is quite stable

play00:42

and cpu utilization is just five percent

play00:44

seven percent and memory utilization is

play00:47

just sixty-five percent and the network

play00:50

utilization also is a

play00:52

very big uh very little

play00:54

and now

play00:55

we'll uh

play00:56

proceed with the attack and this attacks

play00:58

can be even launched with a simple ping

play01:01

command also

play01:02

i can just use the simple

play01:05

ping commands

play01:08

so let me increase the font size so it

play01:12

should be visible

play01:14

better visible for you

play01:17

okay so

play01:18

so usually we used to uh

play01:21

ping the

play01:23

uh

play01:24

destination to know whether you are

play01:26

getting the response

play01:28

so you can see the response it is using

play01:31

only 32 bytes

play01:33

so which will not create any big impact

play01:36

in your

play01:38

network traffic but still

play01:41

the

play01:41

using the simple ping command itself we

play01:44

can use we can

play01:45

uh attack the target

play01:47

by

play01:49

producing continuous ping by using

play01:51

hyphen t

play01:52

and also we can define the length of the

play01:55

packet so usually it is taking 32 bytes

play01:58

here i am going to

play02:00

give

play02:01

something around 50 65

play02:03

500 bytes so this is the maximum

play02:06

number of byte which supports in the

play02:08

ping so usually when uh when you use the

play02:11

ping command it is going to use the icmp

play02:13

protocol so let me try this

play02:17

and again

play02:19

with a single

play02:20

ping operation will not get much

play02:25

difference so let me repeat the command

play02:30

multiple times

play02:32

we'll verify here and here you can see

play02:36

the traffic utilization goes up

play02:39

so it goes up beyond uh

play02:41

uh i think

play02:43

it is it is going beyond

play02:46

4 mbps

play02:48

so

play02:49

from a single computer if you are

play02:51

targeting uh this attack obviously you

play02:53

cannot bring down the target

play02:55

so where uh usually the attackers what

play02:57

they will do is they will plan this

play02:59

attack uh

play03:01

to be launched from

play03:03

multiple devices

play03:04

so maybe a group of

play03:07

attackers will

play03:09

will start attacking this at the same

play03:11

time

play03:12

or you can even they can also

play03:15

do by spreading a botnet into the public

play03:20

internet and uh

play03:22

at a particular time when they want to

play03:24

launch the attack so they will

play03:26

send the instructions to the botnet to

play03:29

launch the attack so immediately all the

play03:31

botnets uh maybe the botnets will be uh

play03:35

installed in any of the internet users

play03:38

computers so from there even lacks of

play03:40

your devices or

play03:42

multiple lacks of devices may get

play03:44

compromised with this kind of botnets so

play03:47

through which they can launch this

play03:48

attack so obviously with this uh

play03:53

this kind of ping attack itself the

play03:56

target can be brought down

play03:58

uh again and this kind of for

play04:00

botnet-based dos attacks uh even finding

play04:03

the a real perpetrator that is the real

play04:07

attacker is going to be a hard

play04:10

hard thing for the in forensic

play04:13

investigators but still

play04:15

it will take long time but finally we

play04:18

can

play04:18

find the

play04:19

person who initiated this attack

play04:23

and even

play04:26

we can also launch attack through some

play04:28

other options so the there

play04:31

since uh when you are using the ping

play04:33

command it is using the icmp packet so

play04:36

most of the organizations they might

play04:38

have blocked the icmp in the firewall

play04:40

itself so by uh by

play04:43

pig of death attack so whatever we have

play04:45

done here is the peak of death attack so

play04:47

by performing the ping ping of

play04:50

death attack is not going to be possible

play04:52

in these cases

play04:53

so even attackers may find some other

play04:56

solutions if your any web server is

play04:57

hosted obviously port 80 or 443 is going

play05:00

to be open

play05:02

so through that port the attackers may

play05:04

flood the packets so they may flood the

play05:07

ac

play05:08

packets or they may flood the syn

play05:10

packets or more

play05:11

so here i'll show you how to perform the

play05:14

uh syn attack

play05:16

so that is syn flooding

play05:18

so syn flooding uh i believe you know in

play05:21

the previous videos we have discussed

play05:23

about the uh tcp flags where the syn syn

play05:26

flag is used for establishing the

play05:28

connection

play05:30

so where attacker may send many uh

play05:34

syn packets to the tag and so through

play05:36

which the

play05:37

target can be brought down

play05:39

and now uh

play05:41

for for using this uh syn flooding we

play05:44

can also use a tool called hping3 which

play05:47

is a famous tool in uh

play05:49

kali linux operating system so we can

play05:52

use this hping3 command

play05:54

hp3 is basically the command and hyphen

play05:58

v is to

play05:59

get the web browse output and hyphen

play06:02

c is to define the

play06:04

size of the packet

play06:06

and hyphen d is to define the uh no i'm

play06:10

sorry hyphen

play06:11

d is to

play06:12

define the

play06:14

size of the packet and hyphen c is to

play06:16

define the number of packets that has to

play06:18

be sent

play06:19

and hyphen s is to define the

play06:22

syn flooding that is to define the syn

play06:25

packet

play06:26

and hyphen p is to define the port and

play06:29

here i want to target the port h0

play06:32

and again hyphen iphone flood and

play06:35

finally the target ip

play06:37

so by giving this command we can

play06:42

consume more resource of the target let

play06:44

me see what

play06:46

happens and here we can see we are not

play06:49

able to access the virtual machine

play06:51

itself

play06:53

so let me stop this command

play06:56

by pressing ctrl c we can stop the

play07:00

proceeding of the command and here you

play07:02

can see the network traffic was

play07:05

utilizing up to 11 mbps

play07:07

and even you can also see the cpu

play07:10

utilization went high

play07:12

now let us try to

play07:15

increase the

play07:17

packet size

play07:19

so

play07:20

let me add one zero

play07:24

so we'll just wait for few seconds

play07:27

then let me stop

play07:29

let me go to the virtual machine again

play07:31

you can see so there is a huge spike

play07:34

and even in the network utilization also

play07:36

you can see there is a huge spike

play07:39

so by doing this continuously obviously

play07:42

to uh

play07:44

get a success in this kind of attacks

play07:46

you need to have a huge amount of

play07:48

resource so basically the results should

play07:50

be higher than the target

play07:52

so in that cases most of them attackers

play07:54

so they'll be

play07:56

doing this as a group a group of

play07:58

attackers will be targeting one

play08:00

particular ip so through which they can

play08:02

bring down the target so this is how

play08:05

they uh launch the ddos attacks

play08:09

and that's all for this demonstration so

play08:12

we'll discuss the rest of the topics in

play08:14

the upcoming videos until then bye

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
DDoS AttacksCybersecurityWindows ServerNetwork TrafficICMP ProtocolBotnet AttackSYN FloodingHping3 ToolServer PerformanceCyber Threats