As I transitioned from physiotherapy to the expansive field of IT, I delved into the world of penetration testing, focusing on the intriguing domain of DOS attacks. Join me as I provide a succinct glimpse into the carefully orchestrated laboratory that defined this pivotal phase of my journey:
Setting the Stage: Unveiling a DOS Attack Scenario
Within this chapter of my evolution, I forged a meticulously crafted laboratory environment, leveraging virtual machines to simulate key roles:
Virtual Machine Ensemble:
Kali Linux: The heart of my setup, Kali Linux, with its configured IPv4 settings, became the foundation. Through the adept use of the “IP addr” command, I manipulated IP addresses, subnet masks, and NIC associations.
Windows 2016: Complementing Kali Linux, the Windows 2016 virtual machine played a crucial role in this exploratory journey.
Executing the DOS Attack:
The core of this endeavor lay in the execution of a DOS attack, shedding light on the intricacies:
Harnessing hping3: From within my Kali Linux machine, I skillfully employed hping3, a potent tool known for its role in initiating DOS attacks.
Mapping the Target: Nmap was employed to pinpoint the target’s IP and open port, setting the stage for the orchestrated transmission of ICMP packets via hping3.
Visualizing the Onslaught: To render the digital attack tangible, I utilized Wireshark, capturing the syn flood and transforming it into a visual representation.
Configuring the Windows Firewall:
Precision was ensured by configuring the Windows 2016 virtual machine:
Firewall Adjustments: The Windows environment saw meticulous adjustments to accommodate the receipt of ICMP messages. This strategic maneuvering set the scene for the imminent DOS attack initiated from the Kali machine.
Assessing the Impact:
As the orchestrated attack unfolded, I meticulously monitored the Windows 2016 machine’s task manager, observing CPU resource fluctuations and understanding the impact on system performance.
In Conclusion: Embracing Cybersecurity
This immersive laboratory experience in my transition from physiotherapy to the dynamic realm of IT demonstrated the ever-evolving nature of cybersecurity. With each exploration, new layers of knowledge are unveiled, enhancing my ability to navigate and excel in this vibrant domain. This journey serves as a testament to the boundless opportunities that await those who are willing to immerse themselves in the captivating world of cybersecurity.