Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q, Inter-Switch Link Protocol (ISL), and VLAN Trunking (VTP). It helps the pen-tester in different tasks, such as becoming the root role in the Spanning Tree, creating virtual CDP neighbors, setting up rogue DHCP servers, becoming the active router in a HSRP scenario, enabling trunk, performing ARP spoofing over VLAN hopping, adding or deleting VLANs (via VTP), and more.
Author: David Barroso Berrueta "tomac" <tomac [at] wasahero [dot] org>
Maintainer: The T2 Project <t2 [at] t2-project [dot] org>
Build time (on reference hardware): 100% (relative to binutils)2
Installed size (on reference hardware): 0.54 MB, 8 files
Dependencies (build time detected): 00-dirtree bash binutils bzip2 coreutils diffutils findutils gawk gcc glibc grep libnet libpcap linux-header make mktemp ncurses net-tools sed sysfiles tar util-linux
Installed files (on reference hardware): n.a.
1) This page was automatically generated from the T2 package source. Corrections, such as dead links, URL changes or typos need to be performed directly on that source.
2) Compatible with Linux From Scratch's "Standard Build Unit" (SBU).