Analyze a SYN Flood Attack (credit to MindTap)
You are the security analyst for a small corporate network. You have heard complaints that the CorpServer (192.168.0.10) seems to be very unresponsive. You suspect that the server may be under a SYN attack.
In this lab, your task is to:
- Use Zenmap to find which ports on CorpServer (192.168.0.10) are open.
- Use Wireshark and the enp2s0 network interface to determine if the CorpServer is under a SYN attack.
- Analyze the packets captured.
- Answer the questions.
EXPLANATION
Complete this lab as follows:
- From Zenmap, use nmap to find the open ports used on CorpServer.
- From the Favorites bar, select Zenmap.
- In the Command field, type nmap -p 0-100 192.168.0.10
- Select Scan.
- In the top right, select Answer Questions.
- Answer Question 1.
- Minimize the Lab Question dialog.
- Close Zenmap.
- Capture SYN packets on the CorpServer machine.
- From the Favorites bar, select Wireshark.
- Under Capture, select enp2s0.
- In the Apply a display filter field, type host 192.168.0.10 and tcp.flags.syn==1
- Press Enter.
- Select the blue fin to start a Wireshark capture.
- Capture packets for a few seconds.
- From Wireshark, select the red box to stop the Wireshark capture.
- Maximize Wireshark for better viewing.
- Analyze Wireshark data for signs of a SYN attack.
- Notice that only SYN packets were captured.
- Notice the time between each packet that was sent to host 192.168.1.10.
- Look for the port numbers being used in the SYN packets.
- Maximize the Lab Question dialog.
- Answer Questions 2 and 3.
- Locate the MAC address of the computer initiating the SYN flood attack.
- From the middle pane, expand Ethernet II.
Notice the source MAC address of the computer sending the SYN flood. - Answer Question 4.
- Select Score Lab.
- From the middle pane, expand Ethernet II.
Comments
Post a Comment