preview

Nt1330 Unit 7 Lab

explanatory Essay
545 words
545 words
bookmark

LAB 7 – PING OF DEATH 7.0. INTRODUCTION The Ping of Death (POD) is a type of denial of service attack in which the attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command. (Incapsula, n.d.) This kind of denial of service attack was mainly used in legacy systems because they wouldn’t know what to do with a packet that’s larger than the standard IPv4 packet size of 65,537 when they received it. 000738527 Page 21 of 37 In this lab, we explore how the POD is done by setting up a virtual environment running Win95 as the victim and four others as an attackers. 7.1. REQUIREMENTS/OBJECTIVES  To run and observe the effects of a denial of service attack …show more content…

In this essay, the author

  • Explains how the pod is done by setting up a virtual environment running win95 as the victim and four others as an attackers.
  • Describes how they started their windows 95 machines, then went to the victim (pod server) and clicked run from the start menu and entered winipcfg to show the ip address.
  • Explains that they repeated the ping ten times and left all command prompts running. they then went to the pod server and opened system monitor tool to show the performance of the system.
  • Explains how they started to ping the pod server from all the machines, each having 10 instances of the command prompt running. the processor usage on the server was increasing and increasing until it reached 100%.
  • Describes how the pod server was overwhelmed and the system froze. after a few minutes, some pings started timing out on the attacking machines.
  • Explains the ping of death, a type of denial of service attack in which the attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets.
  • Explains that dos attacks are common among legacy systems, such as ping flood, which sends icmp (internet control message protocol) without waiting for a reply.

I started to ping the POD server from all the machines, each having 10 instances of the command prompt running. As I continued to increase number of ping instances, I noticed that the processor usage on the POD server was increasing and increasing until it came to 100% when all the attacking machines where pinging at the same time. Below is figure 16 showing the graph. Figure 16 100% System Performance Rate 000738527 Page 23 of 37 Once the POD server was overwhelmed, the machine became very slow. Its response time to any command was very long almost nonexistent. The system froze, because I couldn’t even move the mouse. After a few minutes though, I noticed that some pings started timing out on the attacking machines. 7.3. PERSONAL EVALUATION/CONCLUSION This kind of attack if performed on a website means it would bring the website down and therefore no one would have access to it. It poses great danger to the users and stakeholders of the website for it to be down, especially one that manages payment transactions. This kind of DOS attack although common among legacy systems is also possible now with the attack called ping flood, which sends ICMP (internet control message protocol) via ping without waiting for a

Get Access