Abusing a Stateless Firewall

In this lab, you will perform a denial-of-service attack using Python’s Scapy module and hping3 command against the stateless firewall protecting the web server. 

outcomes:

In this lab, you will learn to: 

  1. Attack a firewall with a DoS with Scapy.
  2. Attack a firewall with a DoS with hping3.

videos: 

Setting Up the Virtual Environment 

Crafting a TCP SYN ACK Packet with Scapy 

Executing a TCP SYN ACK attack using Hping3 

Overview

A stateless firewall can be used to minimize the risk associated with certain attacks. However, a stateless firewall does not retain the state for a given connection. This lab will demonstrate how a stateless firewall will allow a new connecting client to send a TCP SYN ACK packet as the first means of communication with the server. Then, we will use Hping3 to demonstrate a TCP SYN ACK DoS attack. The pentesting assignment for this LAB will be to craft a TCP SYN ACK DoS attack using Scapy.

image001.jpg

Abusing a Stateless Firewall

Key terms and descriptions

Stateless firewall
A stateless firewall is a packet filtering firewall that works on Layer 3 and Layer 4. These kinds of firewalls work on a set of predefined rules and allow or deny the incoming and outgoing data packets based on these rules.
Denial of service
A common cyber-attack is a denial-of-service attack (DoS attack) that makes a machine or network resource unavailable temporarily or indefinitely disrupting services on a machine connected to a network.
TCP flood
TCP flood is a denial-of-service attack that uses the three-way handshake that TCP uses to setup virtual connections between two hosts.