[COPY] --- T2-COPYRIGHT-NOTE-BEGIN --- [COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch. [COPY] [COPY] T2 SDE: package/.../yersinia/yersinia.desc [COPY] Copyright (C) 2006 The T2 SDE Project [COPY] [COPY] More information can be found in the files COPYING and README. [COPY] [COPY] This program is free software; you can redistribute it and/or modify [COPY] it under the terms of the GNU General Public License as published by [COPY] the Free Software Foundation; version 2 of the License. A copy of the [COPY] GNU General Public License can be found in the file COPYING. [COPY] --- T2-COPYRIGHT-NOTE-END --- [I] A framework for layer 2 attacks [T] Yersinia implements several attacks for the following protocols: [T] Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host [T] Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking [T] (DTP), 802.1q, Inter-Switch Link Protocol (ISL), and VLAN Trunking [T] (VTP). It helps the pen-tester in different tasks, such as becoming [T] the root role in the Spanning Tree, creating virtual CDP neighbors, [T] setting up rogue DHCP servers, becoming the active router in a HSRP [T] scenario, enabling trunk, performing ARP spoofing over VLAN hopping, [T] adding or deleting VLANs (via VTP), and more. [U] http://www.yersinia.net [A] David Barroso Berrueta "tomac" [M] Christian Wiese [C] extra/tool [L] GPL [S] Beta [V] 0.7 [P] X -----5---9 800.000 [D] 3298322108 yersinia-0.7.tar.gz http://www.yersinia.net/download/