Book Image

BackTrack 5 Cookbook

By : Willie L. Pritchett, David De Smet
Book Image

BackTrack 5 Cookbook

By: Willie L. Pritchett, David De Smet

Overview of this book

<p>BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.<br /><br />"BackTrack 5 Cookbook" provides you with practical recipes featuring many popular tools that cover the basics of a penetration test: information gathering, vulnerability identification, exploitation, priviledge escalation, and covering your tracks.<br /><br />The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.<br /><br />We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.<br /><br />"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.</p>
Table of Contents (17 chapters)
BackTrack 5 Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Causing a denial of service


In this recipe, we will use Iaxflood to cause a denial of service on a target SIP device. A denial-of-service attack is designed to send enough traffic across the network (LAN or WAN) that causes a device to become unavailable to legitimate users. In this case, we are using Iaxflood to perform the attack on an Asterisk PBX system. Similarly, Inviteflood could be utilized to flood a target with "invite" requests until it cannot keep up with the traffic sent and denies all traffic.

Getting ready

The following requirements need to be fulfilled:

  • You will need an Internet or intranet connection to perform this recipe

  • You will also need SIP or PBX devices on your network

How to do it...

Let's begin the process of causing a denial-of-service attack by opening a terminal window:

  1. Open a terminal window and navigate to the folder containing Iaxflood:

    cd /pentest/voip/iaxflood
    
  2. The syntax for running Iaxflood is ./iaxflood [source IP] [destination IP] [number of packets]. In our...