[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
<>1.描述
<>抗攻击
检验依据:一般的网络隔离产品应能够抵御各种 DoS/DDoS攻击,应能够识别和防御 SYN Flood、ICMP Flood等攻击。
检验方法: 查看提供的文档,是否提供了抗攻击功能;
配置启用网络隔离产品抗攻击功能;
通过对管理口和业务口的模拟攻击测试,查看测试结果、设备日志并检查攻击过程中是否影响正常业务。
<>ddos攻击
全称是 Distributed Denial of Service,是指攻击者利用“肉鸡”对目标网站在较短的时间内发起大量请求,大规模消耗目标网站的
主机资源,让它无法正常服务。有tcp攻击、udp攻击、dns攻击等等,是通过不同的协议去攻击,目的都是为了让目标服务器无法正常工作。
<>hyenae
hyenae是在windows上非常好用的一款ddos攻击工具,可以完成绝大多数的攻击操作
<>hping3
hping3是kali中的一个工具,是 面向命令行的用于生成和解析TCP/IP协议数据包汇编/分析的开源工具。
常用参数
-v --version 显示版本
-c --count 发送数据包的数目
-I --interface 网卡接口 (默认路由接口)
<>2.攻击
<>hyenae
先打开虚拟中的靶机
hyenae攻击工具中填写相关参数
源信息可任意
使用wireshark进行抓包查看流量情况(该说不说,崩了好几次)
明显能看出靶机的回包很少(红色部分)
使用的源设备信息是任意的,所以有多个ip向靶机192.168.269.134发包,长此以往,不是他崩就是我崩,所以,就不继续啦
<>hping3
打开kali
在工具中搜索hping3
点击
设置参数
其中-I eth0指定使用eth0端口,-S指定TCP包的标志位SYN,-p 80指定探测的目的端口。
使用wireshark抓包