Tool: Yersinia
Use: System hacking
Version: 0.7.3
OS: Linux
Vendor/Author: By David Barroso <tom[email protected]> and Alfredo Andres <[email protected]>
URL: http://www.yersinia.net/
Status: Unknown/Inactive (It appears latest update is from 2008)
Description: Attacking specialized network protocols such as CDP attacks, DHCP starvation/exhaution attacks and much more.
From the MAN page:
Even this framework or tools seems to be inactive it is still a very useful tool as most of the protocols this tool is capable of attacking, has not changed. The tool is targeting larger corporations. To use the full feature set you really have to know what you are doing and how the target protocols work.
This tool has the capability to run in three modes:
* Graphical mode using the -G option
* Intaractive mode using the -I option
* Daemon mode using the -D option.
Below is a screenshot from the graphical mode.
Use: System hacking
Version: 0.7.3
OS: Linux
Vendor/Author: By David Barroso <tom[email protected]> and Alfredo Andres <[email protected]>
URL: http://www.yersinia.net/
Status: Unknown/Inactive (It appears latest update is from 2008)
Description: Attacking specialized network protocols such as CDP attacks, DHCP starvation/exhaution attacks and much more.
From the MAN page:
Yersinia is a framework for performing layer 2 attacks. The following protocols have been implemented in Yersinia current version: Spanning Tree Protocol (STP), VLAN Trunking Protocol (VTP), Hot Standby Router Protocol (HSRP), Dynamic Trunking Protocol (DTP), IEEE 802.1Q, IEEE 802.1X, Cisco Discovery Protocol (CDP), Dynamic Host Configuration Protocol (DHCP), Inter-Switch Link Protocol (ISL) and MultiProtocol Label Switching (MPLS).
Some of the attacks implemented will cause a DoS in a network, other will help to perform any other more advanced attack, or both. In addition, some of them will be first released to the public since there isn't any public implementation.
Yersinia will definitely help both pen-testers and network administrators in their daily tasks.
Some of the mentioned attacks are DoS attacks, so TAKE CARE about what you're doing because you can convert your network into an UNSTABLE one.
Some of the attacks implemented will cause a DoS in a network, other will help to perform any other more advanced attack, or both. In addition, some of them will be first released to the public since there isn't any public implementation.
Yersinia will definitely help both pen-testers and network administrators in their daily tasks.
Some of the mentioned attacks are DoS attacks, so TAKE CARE about what you're doing because you can convert your network into an UNSTABLE one.
This tool has the capability to run in three modes:
* Graphical mode using the -G option
* Intaractive mode using the -I option
* Daemon mode using the -D option.
Below is a screenshot from the graphical mode.