You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
40 lines
1.5 KiB
40 lines
1.5 KiB
18 years ago
|
[COPY] --- T2-COPYRIGHT-NOTE-BEGIN ---
|
||
|
[COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
|
||
|
[COPY]
|
||
|
[COPY] T2 SDE: package/.../yersinia/yersinia.desc
|
||
|
[COPY] Copyright (C) 2006 The T2 SDE Project
|
||
|
[COPY]
|
||
|
[COPY] More information can be found in the files COPYING and README.
|
||
|
[COPY]
|
||
|
[COPY] This program is free software; you can redistribute it and/or modify
|
||
|
[COPY] it under the terms of the GNU General Public License as published by
|
||
|
[COPY] the Free Software Foundation; version 2 of the License. A copy of the
|
||
|
[COPY] GNU General Public License can be found in the file COPYING.
|
||
|
[COPY] --- T2-COPYRIGHT-NOTE-END ---
|
||
|
|
||
|
[I] A framework for layer 2 attacks
|
||
|
|
||
|
[T] Yersinia implements several attacks for the following protocols:
|
||
|
[T] Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host
|
||
|
[T] Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking
|
||
|
[T] (DTP), 802.1q, Inter-Switch Link Protocol (ISL), and VLAN Trunking
|
||
|
[T] (VTP). It helps the pen-tester in different tasks, such as becoming
|
||
|
[T] the root role in the Spanning Tree, creating virtual CDP neighbors,
|
||
|
[T] setting up rogue DHCP servers, becoming the active router in a HSRP
|
||
|
[T] scenario, enabling trunk, performing ARP spoofing over VLAN hopping,
|
||
|
[T] adding or deleting VLANs (via VTP), and more.
|
||
|
|
||
|
[U] http://www.yersinia.net
|
||
|
|
||
|
[A] David Barroso Berrueta "tomac" <tomac@wasahero.org>
|
||
|
[M] Christian Wiese <jeru@ixplanet.org>
|
||
|
|
||
|
[C] extra/tool
|
||
|
|
||
|
[L] GPL
|
||
|
[S] Beta
|
||
|
[V] 0.7
|
||
|
[P] X -----5---9 800.000
|
||
|
|
||
|
[D] 3298322108 yersinia-0.7.tar.gz http://www.yersinia.net/download/
|