Thank you for taking the time to visit my personal website. Hopefully the information I have presented on this site can be useful and there is knowledge.

Saturday, March 17, 2012

DoS Attack Tools | Tools Used For Denial Of Service Attacks

In this post we will discus a little about tools that can be used for DoS attacks. Please note that tools used for DoS attacks and DDoS are different, here we will discus only those tools which are used for DoS attack not those which are used for DDoS. Most of the DoS tools are nothing but programs written by programmers,
by the way you don't need to know about programming to understand and run these tools. These tools may be OS specific or platform independent depending on what condition the programmers has built the code.


Jolt:
Jolt is DoS tool used to exploit vulnerability in windows networking code. It allows attacker to consume 100% of CPU time by sending packets that needs heavy CPU usage for processing. Though it is specially designed for windows it really isn't platform specific. The most vulnerable server to it is Windows 2000 Server.

Bubonic:
It is a C program when compiled can be used against windows and Linux. Linux versions which were not updated since 2.0.3.0 kernel are vulnerable along with windows 2003 server

Land:
Land tool sends victim request by spoofing IP address of packet with IP address of victim. Since IP address of source and destination are same, system crashes as system starts flooding itself with packets.

LaTierra:
It also works as Land tool but it sends TCP packets to more than one port number.

Targa;
One of the most horrible DoS tool in list is Targa. Targa can launch DoS attack in all possible types of DoS attacks. Its efficiency increases exponentially with more number of PC's.

Blast:
Blast is TCP services stress test tool but can also be used for launching DoS attack against unprotected server.

Nemsey:
It is a program that generates random packets with random port number and IP address and floods victim with it.

Panther:
Its a packet flooding program that can overload a network connection with ICMP packets by sending fast ping requests causing a DoS attack.

Crazy Pinger:
It is also DoS tool of category flooder. It sends very large packets of ICMP to target.

FSMax:
It is a scrip-table server stress testing tool. This takes a text file as input and runs a server through a series of tests based on input. The purpose of this tool is to find buffer overflows of DoS points in a server.

Angry IP Scanner

The next phase to reconnaissance is scanning. In this phase an attacker tries to gather information like IP address, operating system, open ports, running services etc. This information is further used by him to study kind of attack he must perform. Scanning can be classified into three major types,

  1. Port Scanning
  2. Network Scanning
  3. Vulnerability Scanning

During port scanning an attacker tries to find out number of ports open on target system and services running on them. The next stage is to find out number of active machines the target have and lastly vulnerability scanning in which attacker tries to get details about weaknesses present in target system.

There are several tools that can be used to perform port scanning among which nmap is considered as best which I have already discussed long before on this blog. To read about it have a look on Network Scanner Nmap.

Here in this section we will see how to determine active systems. For our practical we will use Angry IP Scanner. Angry IP Scanner is a tool which pings several hosts in a row to find out which of them is currently alive. Download Angry IP Scanner from http://www.angryip.org/w/Download. Run it and specify number of IP address you want to scan.


5 Basic Switch Settings You Must Know

There are five configurations a network administrator should apply to a newly provisioned switch or router. Although application of these configurations may seem like common sense, 90% of devices I see are missing at least one of these settings, and about 75% are missing two or more. Use this checklist as an action item to verify your existing devices have these settings, at minimum, and integrate these in to any templates or provisioning documents you use. You'll appreciate the results of the consistency this adds to your network management and monitoring.
Define a default gateway or default route
Let's start with the fantastically easy one--a management IP and default gateway. Obviously, you can't manage a device across the network unless it has, at bare minimum, a management IP address. Instead of harping on the obvious, instead take note that many times when edge devices are provisioned, an IP address is configured but the default gateway or default route is forgotten or omitted.
What happens when this configuration is missing? Those edge switches will hum along happily until one of three things happens:
  1. Your management tool is installed or moved to a different subnet.
  2. You try to manage the switch from a different network or subnet.
  3. You begin adding other VLANs or subnets to the switch.


Without a default gateway or route off of the network the switch is using, traffic may reach the switch, but it won't find its way back off that network. You won't believe how many edge devices are in the wild with this grievous omission, often resulting in the switch becoming unmanaged, by virtue of the management tools not able to see it.
Cisco & HP Networking:
# ip default-gateway
# ip route 0.0.0.0 0.0.0.0
Set the time
If I could ask administrators to set only one configuration out of the box after the basic IP settings, I'd ask for this: the correct time. Correct time on a switch is vital when troubleshooting the device. A string of log entries dated 1/1/90 are useless to network administrators troubleshooting a problem.
The three most popular ways to set time on a device are manual time settings, TimeP or Network Time Protocol (NTP), and Simple NTP (SNTP). You should really have a time server in your environment to keep the network all in sync. If you don't have a time server now, you can very easily add one. In Windows Server environments, a few clicks will have you up and running with SNTP in less than 5 minutes. You can also use public (Internet-hosted) time servers, although you shouldn't put yourself in a position to force each switch to call out over the Internet for time. As a last resort, set the time manually, but, by all means, set it somehow.
Cisco:
# ntp server
# clock timezone
# show clock
HP Networking:
# ip timep manual
# timesync timep
# clock timezone
Or
# sntp server
# sntp unicast
# timsync sntp
# show time
Enable neighbor discovery
Neighbor discovery protocols are essential for network administrators and management tools to accurately construct a view of the network topology. Each manufacturer has its own supported mix of neighbor discovery protocols, loosely based on how standards-focused that vendor is and how much it wants to pay in royalties to use proprietary protocols. The two most widely used are LLDP (Link Layer Discovery Protocol), an IEEE standard, and CDP (Cisco Discovery Protocol). Support varies by brand and at times even by model or firmware versions. What you may see in some devices is LLDP supported for listening and talking, but only the only CDP support is for listening. Others may offer equal capabilities for both protocols.
Enabling all supported neighbor discovery methods is highly recommended. The information it provides lets you immediately locate neighboring switches and even media endpoints such as phones and access points that use LLDP-MED, an extension of LLDP. Not only can you see where these devices are connected, you can get details of the device type, its host name, IP address and even what port it's connected to on the other end. In a similar fashion, your network monitoring and management tools will use these protocols to crawl the network, discover new devices, and correctly identify and show interswitch links.
Cisco: CDP is enabled by default, Enable LLDP
# lldp run
# show lldp neighbors <+ optional details>
HP Networking: LLDP is enabled by default. Enable CDP receive only support
# show lldp info remote <+ optional details>
# show cdp neighbors <+ optional details>
Configure logging and traps
Notifications of events on the network are a critical component of monitoring, troubleshooting and real-time alerting. Most switches offer two primary means of sending this data to a central repository: logging events via syslog and trap events via SNMP ((Simple Network Management Protocol). Configuration of both is simple, usually varying minimally from switch to switch and even from brand to brand.
Most organizations have a syslog server or a management tool configured to receive SNMP traps. If yours doesn't have such an application, I'd strongly encourage you to use this opportunity to investigate your options. If you don't have budget or time, look at your existing management tools and you'll likely find something you can use already in production. If not, there are a variety of free syslog and SNMP tools; just make sure you download free tools from a source you trust.
Cisco & HP Networking:
# logging
# snmp-server host
Add custom SNMP communities
SNMP is used to manage or monitor all types of devices in a network, including switches, servers and even desktops. SNMP allows us to define different community strings that are mapped to different access rights. Most simply, we have a read-only string and a read-write string. The read-only string lets monitoring tools see and gather information from the device, whereas the read-write string allows management tools to make modifications and configuration changes to the device. By default, switches most often have either no predefined strings or they use a combination of public and private.
Some of you may feel this should be included with the full management configuration (defining local users or RADIUS/TACACS authentication, enabling secure management with SSH and HTTPS), but I define it as one of the recommended out-of-the-box settings. Within an organization, you likely have only a set or two of custom SNMP community strings, and these strings aren't going to change from the time you order the switch, unbox it and then deploy it. Initial omission of the strings is usually an oversight, or network admins consciously leave it out and figure they'll go back and add it later. Your management tools should already be set to talk to your devices using your custom SNMP strings, so go ahead and start off on the right foot by setting it early on the device. Remember, they are case-sensitive, and you'll avoid the frustration of typos if you include these in a template or at least copy-paste from a base text document. Incorrect SNMP strings are frustrating, especially in larger environments. Correct strings will let your device be seen and managed immediately by all your management and monitoring applications.
Cisco:
# snmp-server community ro
# snmp-server community rw
# show snmp
HP Networking:
# snmp-server community operator restricted
# snmp-server community manager unrestricted
# show snmp-server
There are many other configurations recommended in a production environment, including secure encrypted management and file transfers, as well as SNMPv3 in certain networks. These five settings are a quick start to ensuring consistent management of your infrastructure devices across the enterprise. 

source: http://www.networkcomputing.com/