O'Reilly logo

Kali Linux Network Scanning Cookbook by Justin Hutchens

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sock stress DoS attack

The sock stress DoS attack consists of establishing a series of open connections to the TCP port associated with the service to be attacked. The final ACK response in the TCP handshake should have a value of 0.

Getting ready

To use Scapy to perform a sock stress DoS attack against a target, you will need to have a remote system that is running network services over TCP. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on setting up Metasploitable2, please refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started, of this book. Additionally, this section will require a script to be written to the filesystem, using a text editor such as VIM or Nano. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required