Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Attack_Project_Presentation_ISSC461_Intindolo

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 15 Anzeige

Weitere Verwandte Inhalte

Ähnlich wie Attack_Project_Presentation_ISSC461_Intindolo (20)

Anzeige

Weitere von John Intindolo (17)

Attack_Project_Presentation_ISSC461_Intindolo

  1. 1. Attack Project Presentation: Bloggingtheboys.com By John Intindolo ISSC461 Instructor Christopher Weppler (“Largest ddos attack,” 2012)
  2. 2. ORGANIZATION- SB Nation:BloggingThe Boys (“Blogging the boys”, 2014) Why bloggingtheboys.com?  Being a lifelong and diehard Philadelphia Eagles fan I have an obvious hatred for the Dallas Cowboys. It is because of this hatred I am choosing to attack the blog fan site “Blogging the Boys” with a Denial-of-Service attack that will crash the site, and thus shut up these lousy Cowboys fans... at least for a short while.
  3. 3. Plan ofAction to Perform the Attack  Hide Your IP Address- to protect your online identity  Ping the Web Address- to find out the IP address of the website  Scan the IP Address- to see what ports are open  Perform the Attack- use the RDos program to launch the attack and exploit the open port (“A healthy body”, 2013)
  4. 4. Denial-of-Service Attack (“How to hack,” 2013) What is a DoS Attack?  A Denial-of-service attack which is commonly referred to as a DoS attack is the attempt to defeat the availability (the “A” of the CIA Triad) of a network (Pleeger, 2012, p. 602). Generally speaking its used to interrupt or suspend services of a host connected to the Internet for a temporary amount of time. It is an attack that is sent by a single person or system.
  5. 5. Distributed Denial-of-ServiceAttack: What is a DDoS Attack? (Nelson, 2011)  A Distributed Denial-of-Service attack or DDoS is a Denial-of- Service attack that takes place in two steps. The first step is for the attacker to plant a Trojan horse on the target machine and repeat the process on many different computers. These machines which are known as zombies are then told by the attacker to launch the attack, and cause the interruption of the network availability (Pleeger, 2012, p. 637).
  6. 6. DoS & DDoS Attack Difference DoS Attack • One computer and one Internet connection is used to flood the server with packets. DDoS Attack • Uses many computers and a multitude of Internet connections to flood the server. • Often uses a Trojan to gain access to many computers that are then turned into zombies to perform the attack when called upon by the attacker.
  7. 7. Download IPHiding Tool: IP HiderPro (“Ip hider pro”, 2013)
  8. 8. Download a Port ScanningTool: Nnmap’s Zenmap GUI (“Nmap”, 2013)
  9. 9. Download the HackingTool: rDoS (“Mpgh: Multiplayer game”, 2013)
  10. 10. UsingCMD: PingBloggingtheboys.com
  11. 11. UsingZenmapGUI: Scan theIP address for Open Ports
  12. 12. UsingrDos to Perform theAttack (“How to hack,” 2013)
  13. 13. The Network Has BeenCrashed (“5 things you”, 2010)
  14. 14. References • 5 things you can do to make your website crash free. (2010). Retrieved from http://www.pradoseo.com/5-things-you-can-do-to-make-your-website-crash-free/ • A healthy body and mind in 2011: Your plan of attack. (2013). Retrieved from http://www.marksdailyapple.com/a-healthy-body-and-mind-in-2011-your-plan-of-attack/ • Blogging the boys. (2014). Retrieved from http://www.bloggingtheboys.com • Cyber sucks. (2013). Retrieved from http://cybersucks.blogspot.com/2012_02_01_archive.html • How to hack wi-fi: Performing a denial of service (dos) attack on a wireless access point. (2013). Retrieved from http://null-byte.wonderhowto.com/how-to/hack-wi-fi- performing-denial-service-dos-attack-wireless-access-point-0147988/ • Ip hider pro. (2013). Retrieved from http://iphiderpro.com/
  15. 15. Referencescont’d. • Largest ddos attack on record slowed the internet?. (2012). Retrieved from http://www.vpntutorials.com/blog/largest-ddos-attack-on-record-slowed-the- internet-94/ • Mpgh: Multiplayer game hacking. (2013). Retrieved from http://www.mpgh.net/forum/57- general-hacking/96914-hacking-tool-pack-bots-dos-keyloggers-virus.html • Nelson, C. (2011). Cyber warfare: The newest battlefield. Retrieved from http://www.cs.wustl.edu/~jain/cse571-11/ftp/cyberwar/ • Nmap. (2013). Retrieved from http://nmap.org/ • Pleeger, Charles (2012). Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. ISBN: 978-0-13-278946-2. Prentice Hall-Pearson Publication

Hinweis der Redaktion

  • I have decided to do my attack project presentation on an affiliate of SB Nation known as Blogging the Boys. It is a fan blog for the NFL Franchise the Dallas Cowboys.
  • For the purpose of this attack a DoS will be used, but had the chosen target been a bigger website such as bank’s online website then a DDoS attack would be needed in order to interrupt the availability of the site.
  • The first step is to download the IP hiding tool to protect your identity
  • The next step is to download the port scanning tool Zenmap GUI from the Nmap website so that you can scan the IP address for open ports which creates a vulnerability to a DoS attack.
  • The next step is to download the program rDoS so that you are able to carry out the attack and crash the website.
  • Once you open the cmd type the following to get the IP address of the website:

    ping www.bloggingtheboys.com
  • Using the IP address of www.bloggingtheboys.com discovered from pinging the website in cmd, it is now time to scan that IP address for open ports in Zenmap GUI.

    In the “target” window type in the IP address which is: 199.27.78.185

    In the “Profile” drop down menu select “Intense scan, all TCP ports” to reveal all TCP ports that are open and click the “scan” button

    After the scan has finished you will see three ports that are open and leave a vulnerability to an attack

    The open ports are: 554, 80, and 443

    Port 80 will be used for this attack
  • Enter the IP address of the website which is 199.27.78.185

    Press the “Enter” button

    Enter “80” where it asks for port number

    Press the “Enter” button

    The rDos program will now perform a DoS that will crash the website “Blogging The Boys”
  • The website “Blogging The Boys” has now been successfully crashed

×