By the end of this section, you will be able to:
● Understand the concept and impact of a SYN flood attack.
● Execute a SYN flood from a Kali Linux machine to disrupt a target web server.
● Monitor the behavior of Web-SRV2 under attack and analyze its response.
In this exercise, you will gain hands-on experience with:
● The TCP three-way handshake and how SYN floods exploit it.
● How to use tools like hping3, nping, or LOIC to generate SYN flood traffic.
● Targeting Web-SRV2 (192.168.1.7) from the Kali-Attacker machine.
● Observing the impact on server performance, responsiveness, and resource usage.