top of page

Network Attacks + Packet Sniffer

Ran multiple network attacks in a sandbox. The network was created using the CORE simulation environment. I also created a packet sniffer in the same sandbox to verify what packets were being sent and received.   

Depositphotos_217586776_xl-2015-2.jpg

        There are three attacks I ran. The first one was a packet sniffer that I built using Python code. Wireshark was used to verify whether the packet sniffer was working as expected. 

        The second attack was an ICMP flood attack. This involved sending a flood of ICMP attacks to the victim. An additional layer feature of the ICMP flood attack was MAC address spoofing.

        The third attack to be done was a TCP SYN flooding attack. The victim host was sent a flood of TCP SYN messages, thereby loading the host with half open connections. 

bottom of page