Network Security Testing | 49




Download 22,59 Mb.
Pdf ko'rish
bet53/225
Sana14.05.2024
Hajmi22,59 Mb.
#232856
1   ...   49   50   51   52   53   54   55   56   ...   225
Bog'liq
learningkalilinux

Network Security Testing | 49


Example 2-6. SIP invite flood
root@rosebud:~# inviteflood eth0 kilroy dummy.com 192.168.86.238 150000
inviteflood - Version 2.0
June 09, 2006
source 
IPv4 addr:port
=
192.168.86.35:9
dest IPv4 addr:port
=
192.168.86.238:5060
targeted 
UA
=
kilroy@dummy.com
Flooding destination with 
150000
packets
sent: 150000
We can break down what is happening on the command line. First, we specify the
interface that 
inviteflood
is supposed to use to send the messages out. Next, is the
username. Since SIP is a VoIP protocol, it’s possible that this may be a number, like a
phone number. In this case, I am targeting a SIP server that was configured with user‐
names. Following the username is the domain for the username. This may be an IP
address, depending on how the target server is configured. If you don’t know the
domain for the users, you could try using the IP address of the target system. In that
case, you’d have the same value twice, since the target is the next value on the com‐
mand line. At the end is the number of requests to send. That 150,000 requests took
seconds to send off, meaning that the server was capable of supporting a large volume
of requests per second.
Before moving on to other matters, we need to talk about IPv6. While it isn’t yet com‐
monly used as a network protocol across the internet, meaning I couldn’t send IPv6
traffic from my system to, say, Google’s website, the time will come when that should
be possible. I mention Google in particular because Google publishes an IPv6 address
through its Domain Name System (DNS) servers. Beyond being able to send IPv6
through the internet, though, is the fact that some enterprises are using IPv6 today to
carry traffic within their own enclaves. However, even though IPv6 is more than 20
years old, it has not had the same run-in time that IPv4 has had—and it took decades
to chase some of the most egregious bugs out of various IPv4 implementations. This
is all to say that in spite of the time that operating system vendors like Microsoft and
the Linux team have put into development and testing, more real-world testing across
a wide variety of devices is still needed to be comprehensive.
This is all to say that Kali includes IPv6 testing tool suites. There are two of them, and
each suite has a good-sized collection of tools because in the end, IPv6 includes more
than just changes to addressing. A complete implementation of IPv6 includes
addressing, host configuration, security, multicasting, large datagrams, router pro‐
cessing, and a few other differences. Since these are different functional areas, multi‐
ple scripts are necessary to handle those areas.

Download 22,59 Mb.
1   ...   49   50   51   52   53   54   55   56   ...   225




Download 22,59 Mb.
Pdf ko'rish