A Case Study: SYN Flood Attack Launched Through Metasploit
- DOI
- 10.2991/ahis.k.210913.065How to use a DOI?
- Keywords
- SYN Flood Attack, Metasploit, DOS Attack
- Abstract
There are many different types of Denial of Service attacks like Ping flood attack and ICMP flood attack but this case study is about Denial of Service SYN flood attack that floods the victim machine with SYN packets and causes the victim machine performance to become slower. In this case study, the Kali Linux machine is used as a virtual machine and act as an attacker that attacks the victim machine, and the victim machine is using Windows 2008. Kali Linux is a well-known operating system used by unethical and ethical hackers out there performing their hacks to the victim or performing pen-testing. And there is a tool that used in Kali Linux to perform the SYN flood attack, the tool is Metasploit framework, which is also a well-known penetration testing framework that is currently using by all professional ethical hackers and also the unethical hackers because it is easier to use and it is a command-line interface which is more professional compare to the tools that is the graphical user interface. Hackers can easily launch the SYN flood attack if the hackers know the IP address of the victim machine and send all the SYN packets to the victim machine to jam the victim machine.
- Copyright
- © 2021, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Ng Kar Zuin AU - Eugene AU - Vinesha Selvarajah PY - 2021 DA - 2021/09/13 TI - A Case Study: SYN Flood Attack Launched Through Metasploit BT - Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) PB - Atlantis Press SP - 520 EP - 525 SN - 2589-4900 UR - https://doi.org/10.2991/ahis.k.210913.065 DO - 10.2991/ahis.k.210913.065 ID - Zuin2021 ER -