Monstersec Blog
LinkedinTwitter
  • Monstersec Blog
  • Adversary Experience
    • Undetectable Phishing setup
    • How to Root any Android phone In A Just Few Hours
    • Red Team Plot
      • Red Team Simulation
      • AD Enumeration
        • Powerview
      • Initial Access
      • Defense Evasion
      • Local Privilege Escalation
      • Credential Access
      • Lateral Movement
      • Local Persistence
      • Domain Privilege Escalation
      • Domain Persistence
      • Beyond Domain Admin
      • AD Certificate Service Attacks
      • Red Team Reference
    • Detection - Blue Team
    • Ransomware Plot
      • Ransomware TTPs
      • Ransomware Analysis
    • Pentesting Plot
      • Mobile Pentesting
      • Network Pentesting
      • API Pentesting
      • Web Pentesting
    • OSINT Plot
    • Cloud Security Plot
      • Azure
      • AWS
      • GCP
    • Attack Surface Management Plot
      • Asset Inventory
      • Asset Analysis
      • Vulnerability Finding
      • Risk Prioritization
    • DDoS Simulation
      • Layer 3
      • Layer 4
      • Layer 7
      • DDOS Bot
    • Automation
    • Cyber Security - Interview Questions
      • Basic Computer Science
      • Offensive Security
        • Pentesting
          • Network
          • Mobile
          • web
        • Red Teaming
        • Cloud Security
Powered by GitBook
On this page

Was this helpful?

  1. Adversary Experience
  2. DDoS Simulation

Layer 4

Command Explaination:

Flags
Hping3 Options
Descriptions

-x --morefrag -y

set more fragments flag set

--dontfrag -F --fin

don't fragment flag set FIN

-S --syn

flag set SYN flag set RST

-R --rst

set RST flag

-P --push

set PUSH flag

-A --ack

flag set PUSH flag set ACK

-U --urg

flag set URG flag set X

-X --xmas

unused flag (0x40) set Y

-Y --ymas

unused flag (0x80)

PreviousLayer 3NextLayer 7

Last updated 2 years ago

Was this helpful?