Thanks but I already have a portscan trace from Laura Chapel's site.
I'm trying to figure out how to recognize a typical DOS attack by looking at a trace. It just should be a lot of SYN/ ACK stuuf there.
Analizing traces is just not my thing, but I'm trying to learn recognizing patterns etc.
you can emulate a DoS attack by using NMAP against a small wannabe firewall like a Linksys or even a older webramp. EtherPeek works well for this as it breaks out the stats of SYN's vs. FINs. With a SYN scan (attack) you will see very high numbers of SYNs and very few FINs. I did this for a screen shot and NMAP brought a webramp to it's knees with over 400 connections open at once. I have a screen shot of trace and the actual trace file.
hi guys! I got a few of these trace files like charge dos, echo dos, land dos, ping of death e.g.
My queation is: why not capturing a penetration testing software doing dos tests...
Regards, Walter
If you find a lot of ICMP paquets, and if you llok the decode and find that the packet is fragmented, there is a Ping of dead, some attacks ( smurf, poD ) use ICMP packets, so you will find an excesive amount of packets of this tipe directed to a one or more machines.
When you have a Targa attack, you will find a lot of connections to a single station and in the decode you will find packets of diferent protocols IGMP also, and ICPM packets from one single station to all the stations, since it will report ICPM por Unreacheable. If you look in MAC traffic you could find the origin, since targa send modified packets it uses aleatory IP addresses but the MAC should be in some cases be the same.
Let me create some attacks and I will send you a trace with all this.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.