-
Notifications
You must be signed in to change notification settings - Fork 0
waived/smurf-attack
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
//////////////////////////////////////// /// SMURF ATTACK - DENIAL-OF-SERVICE /// //////////////////////////////////////// What is a Smurf Attack? A 'Smurf Attack' is an Amplified Denial-of-Service attack that mostly occurs over an individual's local network (this is generally because most perimeter routers are configured not to forward any external traffic that is directed to their broadcast address). How it works? The attacker crafts spoofed ICMP packets which are sent to the Broadcast Address of the network (for example: 192.168.1.255). Each source-address of the packet is spoofed to be the source-address belonging to the local machine that the attacker wants to bring down. The idea is that there are other devices on the network that respond to ICMP traffic. The attacker sends spoofed ICMP packets to the broadcast address, the traffic then gets forwarded to the other local devices on the network, and finally they all respond. The traffic ends up landing at the endpoint of the target. The target will be under heavy load and will ultimately succumb to a Denial-of-Service attack. Requirements? - Latest SCAPY library (pip3 install scapy) - Root elevation and a BASH shell Have fun :)
About
Smurf ─ Amplified LAN attack via spoofed ICMP packets
Topics
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published