Using Metasploit to Flood Target Host

Filed in Uncategorized
  1. Log into the Kali Linux, type nmap -p 4444 then press enter, to check port 4444 is open or not. The result should show that the port is open.

Screen Shot 2018-05-23 at 09.48.31

2. After you ensure that the port is open, begin the SYN flooding on the victim. Launch msfconsole, but first start postgresql and metasploit services

Screen Shot 2018-05-23 at 09.56.17

3.  Type msfconsole in the command line terminal

Screen Shot 2018-05-23 at 09.59.36

4. Type use auxiliary/dos/tcp/synflood , this will launch the synflood module

Screen Shot 2018-05-23 at 10.01.27

5. Determine all option to begin the DoS attack. Type show option and enter to list all option

Screen Shot 2018-05-23 at 10.04.08

6. Now perfrom the SYN flooding on port 4444 with these commands : set RHOST <IP Address> ; set RPORT 4444 ; set SHOST

Screen Shot 2018-05-23 at 10.07.21

7. The SHOST set is to spoof the IP Address of Kali with windows server 2012. Now after setting all module, type exploit and enter to begin

Screen Shot 2018-05-23 at 10.10.04

8. This should begin the syn flooding. To confirm, open wireshark application to check on the windows machine. Select interface and start

Screen Shot 2018-05-23 at 10.13.04

9. It will display the traffic that coming to the machine.

Screen Shot 2018-05-23 at 10.18.36

10. This show that the IP Address of Kali has been spoofed. Open task manager and click performance to see the CPU usage that show the DoS attack is in progress on the machine

Screen Shot 2018-05-23 at 10.22.25

11. Once you done with the performing, click control + C to terminate attack

Screen Shot 2018-05-23 at 10.23.30

Posted by : Raden Aditya Pribadi – CS2020 – 2001605116