Skip to content

Smurf ─ Amplified LAN attack via spoofed ICMP packets

Notifications You must be signed in to change notification settings

waived/smurf-attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

  ////////////////////////////////////////
 /// SMURF ATTACK - DENIAL-OF-SERVICE ///
////////////////////////////////////////

What is a Smurf Attack?
    A 'Smurf Attack' is an Amplified Denial-of-Service attack that mostly occurs over an
    individual's local network (this is generally because most perimeter routers are configured
    not to forward any external traffic that is directed to their broadcast address).

How it works?
    The attacker crafts spoofed ICMP packets which are sent to the Broadcast Address of the
    network (for example: 192.168.1.255). Each source-address of the packet is spoofed to be
    the source-address belonging to the local machine that the attacker wants to bring down.

    The idea is that there are other devices on the network that respond to ICMP traffic.
    The attacker sends spoofed ICMP packets to the broadcast address, the traffic then gets
    forwarded to the other local devices on the network, and finally they all respond.

    The traffic ends up landing at the endpoint of the target. The target will be under heavy
    load and will ultimately succumb to a Denial-of-Service attack.

Requirements?
    - Latest SCAPY library (pip3 install scapy)

    - Root elevation and a BASH shell


  Have fun :)

Releases

No releases published

Packages

No packages published

Languages