You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

39 lines
1.5 KiB

[COPY] --- T2-COPYRIGHT-NOTE-BEGIN ---
[COPY] This copyright note is auto-generated by ./scripts/Create-CopyPatch.
[COPY]
[COPY] T2 SDE: package/.../yersinia/yersinia.desc
[COPY] Copyright (C) 2006 The T2 SDE Project
[COPY]
[COPY] More information can be found in the files COPYING and README.
[COPY]
[COPY] This program is free software; you can redistribute it and/or modify
[COPY] it under the terms of the GNU General Public License as published by
[COPY] the Free Software Foundation; version 2 of the License. A copy of the
[COPY] GNU General Public License can be found in the file COPYING.
[COPY] --- T2-COPYRIGHT-NOTE-END ---
[I] A framework for layer 2 attacks
[T] Yersinia implements several attacks for the following protocols:
[T] Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host
[T] Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking
[T] (DTP), 802.1q, Inter-Switch Link Protocol (ISL), and VLAN Trunking
[T] (VTP). It helps the pen-tester in different tasks, such as becoming
[T] the root role in the Spanning Tree, creating virtual CDP neighbors,
[T] setting up rogue DHCP servers, becoming the active router in a HSRP
[T] scenario, enabling trunk, performing ARP spoofing over VLAN hopping,
[T] adding or deleting VLANs (via VTP), and more.
[U] http://www.yersinia.net
[A] David Barroso Berrueta "tomac" <tomac@wasahero.org>
[M] Christian Wiese <jeru@ixplanet.org>
[C] extra/tool
[L] GPL
[S] Beta
[V] 0.7
[P] X -----5---9 800.000
[D] 3298322108 yersinia-0.7.tar.gz http://www.yersinia.net/download/