Understanding Cyber Threat Week3 Part2
Understanding Cyber Threat Week3 Part2
Denial of Service (DoS) attacks are among the most disruptive forms of
traffic or requests. This makes the target unable to process legitimate requests,
1.Hardware:
1. A PC or laptop with virtualization software and at least 8GB RAM for hosting virtual
machines (VMs).
2.Software:
1. VMware Workstation or VirtualBox: For setting up virtual environments.
2. Operating Systems:
1. Kali Linux: To act as the attacker system.
2. Ubuntu Server or Windows Server: To act as the target system.
3. Network Tools:
1. hping3: A powerful tool for crafting and sending network packets.
2. Wireshark: For traffic monitoring and analysis.
3.Network Configuration:
1. A virtual network setup where both the attacker and target systems are on the same
subnet.
Conclusion
This lab demonstrates the ease with which a DoS attack can be