None
Yersinia - A Framework for layer 2 attacks
yersinia [-hVGIDd] [-l logfile] [-c conffile] protocol [-M] [protocol_options]
yersinia is a framework for performing layer 2 attacks. The following protocols have been implemented in Yersinia current version: Spanning Tree Protocol (STP), VLAN Trunking Protocol (VTP), Hot Standby Router Protocol (HSRP), Dynamic Trunking Protocol (DTP), IEEE 802.1Q, IEEE 802.1X, Cisco Discovery Protocol (CDP), Dynamic Host Configuration Protocol (DHCP), Inter-Switch Link Protocol (ISL) and MultiProtocol Label Switching (MPLS).
Some of the attacks implemented will cause a DoS in a network, other will help to perform any other more advanced attack, or both. In addition, some of them will be first released to the public since there isn't any public implementation.
Yersinia will definitely help both pen-testers and network administrators in their daily tasks.
Some of the mentioned attacks are DoS attacks, so TAKE CARE about what you're doing because you can convert your network into an UNSTABLE one.
A lot of examples are given at this page EXAMPLES section, showing a real and useful program execution.
Help screen.
Program version.
Start a graphical GTK session.
Start an interactive ncurses session.
Start the network listener for remote admin (Cisco CLI emulation).
Enable debug messages.
Save the current session to the file logfile. If logfile exists, the data will be appended at the end.
Read/write configuration variables from/to conffile.
Disable MAC spoofing.
The following protocols are implemented in yersinia current version:
Spanning Tree Protocol (STP): is a link management protocol that provides path redundancy while preventing undesirable loops in the network. The supported options are:
BPDU version (0 STP, 2 RSTP, 3 MSTP)
BPDU type (Configuration, TCN)
BPDU Flags
BPDU ID
BPDU root path cost
BPDU Root ID
BPDU Bridge ID
BPDU Port ID
BPDU Message Age
BPDU Max Age (default is 20)
BPDU Hello Time (default is 2)
BPDU Forward Delay
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
Cisco Discovery Protocol (CDP): is a Cisco propietary Protocol which main aim is to let Cisco devices to communicate to each other about their device settings and protocol configurations. The supported options are:
MAC Source Address
MAC Destination Address
CDP Version
Time To Live
Device ID
Device Address
Device Port
Device Capabilities
Device IOS Version
Device Duplex Configuration
Device Platform
Device IP Prefix
Device Protocol Hello
Device MTU
Device VTP Management Domain
Device Native VLAN
Device VoIP VLAN Reply
Device VoIP VLAN Query
Device Trust Bitmap
Device Untrusted CoS
Device System Name
Device System ObjectID
Device Management Address
Device Location
Attack to launch
Hot Standby Router Protocol (HSRP):
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
Inter-Switch Link Protocol (ISL):
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
VLAN Trunking Protocol (VTP):
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
Dynamic Host Configuration Protocol (DHCP):
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
IEEE 802.1Q:
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
Dynamic Trunking Protocol (DTP):
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
IEEE 802.1X:
Version
xxxx
xxxx
xxxx
xxxx
xxx
xxxx
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
MultiProtocol Label Switching (MPLS):
Source MAC address
Destination MAC address
Set network interface to use
Attack to launch
Set MPLS Label
Set MPLS Experimental bits
Set MPLS Bottom Of Stack flag
Set MPLS Time To Live
Set MPLS Label (second header)
Set MPLS Experimental bits (second header)
Set MPLS Bottom Of Stack flag (second header)
Set MPLS Time To Live (second header)
Source IP
Source TCP/UDP port
Destination IP
Destination TCP/UDP port
ASCII IP payload
Attacks Implemented in STP:
Attacks Implemented in CDP:
Attacks Implemented in HSRP:
Attacks Implemented in DHCP:
Attacks Implemented in DTP:
Attacks Implemented in 802.1Q:
Attacks Implemented in VTP:
Attacks Implemented in 802.1X:
Attacks Implemented in MPLS:
Attacks Implemented in ISL:
The GTK GUI (-G) is a GTK graphical interface with all of the yersinia powerful features and a professional 'look and feel'.
The ncurses GUI (-I) is a ncurses (or curses) based console where the user can take advantage of yersinia powerful features.
Press 'h' to display the Help Screen and enjoy your session :)
The Network Daemon (-D) is a telnet based server (ala Cisco mode) that listens by default in port 12000/tcp waiting for incoming telnet connections.
It supports a CLI similar to a Cisco device where the user (once authenticated) can display different settings and can launch attacks without having yersinia running in her own machine (specially useful for Windows users).
- Send a Rapid Spanning-Tree BPDU with port role designated, port state agreement, learning and port id 0x3000 to eth1:
yersinia stp -attack 0 -version 2 -flags 5c -portid 3000 -interface eth1
- Start a Spanning-Tree nonDoS root claiming attack in the first nonloopback interface (keep in mind that this kind of attack will use the first BPDU on the network interface to fill in the BPDU fields properly):
yersinia stp -attack 4
- Start a Spanning-Tree DoS attack sending TCN BPDUs in the eth0 interface with MAC address 66:66:66:66:66:66:
yersinia stp -attack 3 -source 66:66:66:66:66:66
The README file contains more in-depth documentation about the attacks.
Yersinia is Copyright (c)
Lots
Alfredo Andres Omella <[email protected]>
David Barroso Berrueta <[email protected]>