min read

Session 2, HTTP Traffic Analysis & Flood Simulation (LAB ONLY)

Objective: Run a simple HTTP server in Kali, capture HTTP traffic in Windows, and distinguish normal patterns from an ICMP flood.LAB ONLY: Flood only in Host-Only/isolated network....

Published September 29, 2025 By Candra Wijaya
Security Etical Hacking
Session 2, HTTP Traffic Analysis & Flood Simulation (LAB ONLY)

Objective: Run a simple HTTP server in Kali, capture HTTP traffic in Windows, and distinguish normal patterns from an ICMP flood.

LAB ONLY: Flood only in Host-Only/isolated network.

Prerequisites & Topology Same topology as Session 1. Kali = HTTP server 10.37.129.3, Windows = client 10.37.129.2.

Preparation Kali has Python 3:

python3 --version

Windows/Mac os is ready to run Wireshark.

Steps

A. Run an HTTP server in Kali

#1
mkdir -p ~/web_test && cd ~/web_test

#2
echo "Hello from Kali" > index.html

#3
python3 -m http.server 8080

(Keep this terminal open.)

B. Access from Windows & capture Windows (Wireshark): select Host-Only interface → Start.

Windows (PowerShell/Browser)/ Mac os (Terminal):

powershell/terminal

curl http://10.37.129.3:8080

# or open in browser

Wireshark display filter:

http
or
tcp.port == 8080

Check: GET / HTTP/1.1, 200 OK, headers (Host, User-Agent, Content-Type).

C. ICMP flood simulation (optional) Kali (new terminal):

sudo apt update && sudo apt install -y hping3
sudo hping3 --flood -1 10.37.129.2 # Ctrl+C to stop

alternative (lighter):

ping -f -i 0.002 10.37.129.2

Wireshark: stop after a few seconds → Statistics → I/O Graph; compare pps before/during flood. Filter: icmp.

Verification / Results

  1. HTTP normal: burst + TCP handshake + request/response
  2. ICMP flood: continuous, high pps, no handshake

Cleanup

  1. Ctrl+C (hping3/ping -f)
  2. Ctrl+C HTTP server
  3. Save pcap

Troubleshooting

  1. hping3 requires sudo
  2. No 8080 visible? Check the filter and the destination IP
Back to blog
Komentar

Bagikan pendapatmu

Tinggalkan komentar dengan namamu dan kami akan menampilkannya di sini.

Jadilah yang pertama memberikan komentar pada tulisan ini.

More stories

Keep exploring

Fresh insights and tutorials handpicked for your curiosity.

View all posts
Snort IDS Setup and Testing Tutorial
Sep 29, 2025 Security

Snort IDS Setup and Testing Tutorial

1. Switch to the Root UserFirst, switch to the root user to ensure you have full administrative privileges:sud...

Read article
Session 1, Introduction & Topology Setup (Kali VM ↔ Windows Host)
Sep 22, 2025 Security

Session 1, Introduction & Topology Setup (Kali VM ↔ Windows Host)

Objective: Set up VM topology, ensure bidirectional connectivity, and perform ICMP packet capture & analys...

Read article
Rangkuman Penggunaan Algoritma Evolusioner
May 6, 2025 Algoritma Evolusioner

Rangkuman Penggunaan Algoritma Evolusioner

Algoritma evolusioner (Evolutionary Algorithms, EA) adalah kelompok metode optimasi yang terinspirasi dari pro...

Read article
Mengenal Machine Learning: Cara Kerja, Jenis, dan Penerapannya di Kehidupan Sehari-hari
May 6, 2025 MachineLearning

Mengenal Machine Learning: Cara Kerja, Jenis, dan Penerapannya di Kehidupan Sehari-hari

🤖 Apa Itu Machine Learning?Machine learning (ML) adalah cabang dari kecerdasan buatan (AI) yang memungkinkan...

Read article