- Log into the Kali Linux, type nmap -p 4444 then press enter, to check port 4444 is open or not. The result should show that the port is open.
2. After you ensure that the port is open, begin the SYN flooding on the victim. Launch msfconsole, but first start postgresql and metasploit services
3. Type msfconsole in the command line terminal
4. Type use auxiliary/dos/tcp/synflood , this will launch the synflood module
5. Determine all option to begin the DoS attack. Type show option and enter to list all option
6. Now perfrom the SYN flooding on port 4444 with these commands : set RHOST <IP Address> ; set RPORT 4444 ; set SHOST
7. The SHOST set is to spoof the IP Address of Kali with windows server 2012. Now after setting all module, type exploit and enter to begin
8. This should begin the syn flooding. To confirm, open wireshark application to check on the windows machine. Select interface and start
9. It will display the traffic that coming to the machine.
10. This show that the IP Address of Kali has been spoofed. Open task manager and click performance to see the CPU usage that show the DoS attack is in progress on the machine
11. Once you done with the performing, click control + C to terminate attack
Posted by : Raden Aditya Pribadi – CS2020 – 2001605116










