1YERSINIA(8) YERSINIA(8)
2
3
4
6 Yersinia - A FrameWork for layer 2 attacks
7
8
10 yersinia [-hVGIDd] [-l logfile] [-c conffile] protocol [-M] [proto‐
11 col_options]
12
14 yersinia is a framework for performing layer 2 attacks. The following
15 protocols have been implemented in Yersinia current version: Spanning
16 Tree Protocol (STP), VLAN Trunking Protocol (VTP), Hot Standby Router
17 Protocol (HSRP), Dynamic Trunking Protocol (DTP), IEEE 802.1Q, Cisco
18 Discovery Protocol (CDP), Dynamic Host Configuration Protocol (DHCP)
19 and, finally, the Inter-Switch Link Protocol (ISL).
20
21 Some of the attacks implemented will cause a DoS in a network, other
22 will help to perform any other more advanced attack, or both. In addi‐
23 tion, some of them will be first released to the public since there
24 isn't any public implementation.
25
26 Yersinia will definitely help both pen-testers and network administra‐
27 tors in their daily tasks.
28
29 Some of the mentioned attacks are DoS attacks, so TAKE CARE about what
30 you're doing because you can convert your network into an UNSTABLE one.
31
32 A lot of examples are given at this page EXAMPLES section, showing a
33 real and useful program execution.
34
36 -h, --help
37 Help screen.
38
39 -V, --Version
40 Program version.
41
42 -G Start a graphical GTK session.
43
44 -I, --interactive
45 Start an interactive ncurses session.
46
47 -D, --daemon
48 Start the network listener for remote admin (Cisco CLI emula‐
49 tion).
50
51 -d Enable debug messages.
52
53 -l logfile
54 Save the current session to the file logfile. If logfile exists,
55 the data will be appended at the end.
56
57 -c conffile
58 Read/write configuration variables from/to conffile.
59
60 -M Disable MAC spoofing.
61
63 The following protocols are implemented in yersinia current version:
64
65
66 Spanning Tree Protocol (STP and RSTP)
67
68 Cisco Discovery Protocol (CDP)
69
70 Hot Standby Router Protocol (HSRP)
71
72 Dynamic Host Configuration Protocol (DHCP)
73
74 Dynamic Trunking Protocol (DTP)
75
76 IEEE 802.1Q
77
78 VLAN Trunking Protocol (VTP)
79
80 Inter-Switch Link Protocol (ISL)
81
83 Spanning Tree Protocol (STP): is a link management protocol that pro‐
84 vides path redundancy while preventing undesirable loops in the net‐
85 work. The supported options are:
86
87
88 -version version
89 BPDU version (0 STP, 2 RSTP, 3 MSTP)
90
91 -type type
92 BPDU type (Configuration, TCN)
93
94 -flags flags
95 BPDU Flags
96
97 -id id BPDU ID
98
99 -cost pathcost
100 BPDU root path cost
101
102 -rootid id
103 BPDU Root ID
104
105 -bridgeid id
106 BPDU Bridge ID
107
108 -portid id
109 BPDU Port ID
110
111 -message secs
112 BPDU Message Age
113
114 -max-age secs
115 BPDU Max Age (default is 20)
116
117 -hello secs
118 BPDU Hello Time (default is 2)
119
120 -forward secs
121 BPDU Forward Delay
122
123 -source hw_addr
124 Source MAC address
125
126 -dest hw_addr
127 Destination MAC address
128
129 -interface iface
130 Set network interface to use
131
132 -attack attack
133 Attack to launch
134
135
136
137 Cisco Discovery Protocol (CDP): is a Cisco propietary Protocol which
138 main aim is to let Cisco devices to communicate to each other about
139 their device settings and protocol configurations. The supported
140 options are:
141
142 -source hw_addr
143 MAC Source Address
144
145 -dest hw_addr
146 MAC Destination Address
147
148 -v version
149 CDP Version
150
151 -ttl ttl
152 Time To Live
153
154 -devid id
155 Device ID
156
157 -address address
158 Device Address
159
160 -port id
161 Device Port
162
163 -capability cap
164 Device Capabilities
165
166 -version version
167 Device IOS Version
168
169 -duplex 0|1
170 Device Duplex Configuration
171
172 -platform platform
173 Device Platform
174
175 -ipprefix ip
176 Device IP Prefix
177
178 -phello hello
179 Device Protocol Hello
180
181 -mtu mtu
182 Device MTU
183
184 -vtp_mgm_dom domain
185 Device VTP Management Domain
186
187 -native_vlan vlan
188 Device Native VLAN
189
190 -voip_vlan_r req
191 Device VoIP VLAN Reply
192
193 -voip_vlan_q query
194 Device VoIP VLAN Query
195
196 -t_bitmap bitmap
197 Device Trust Bitmap
198
199 -untrust_cos cos
200 Device Untrusted CoS
201
202 -system_name name
203 Device System Name
204
205 -system_oid oid
206 Device System ObjectID
207
208 -mgm_address address
209 Device Management Address
210
211 -location location
212 Device Location
213
214 -attack attack
215 Attack to launch
216
217
218 Hot Standby Router Protocol (HSRP):
219
220
221 Inter-Switch Link Protocol (ISL):
222
223
224 VLAN Trunking Protocol (VTP):
225
226
227 Dynamic Host Configuration Protocol (DHCP):
228
229
230 IEEE 802.1Q:
231
232
233 Dynamic Trunking Protocol (DTP):
234
235
236
238 Attacks Implemented in STP:
239
240 0: NONDOS attack sending conf BPDU
241
242 1: NONDOS attack sending tcn BPDU
243
244 2: DOS attack sending conf BPDUs
245
246 3: DOS attack sending tcn BPDUs
247
248 4: NONDOS attack Claiming Root Role
249
250 5: NONDOS attack Claiming Other Role
251
252 6: DOS attack Claiming Root Role with MiTM
253
254
255 Attacks Implemented in CDP:
256
257 0: NONDOS attack sending CDP packet
258
259 1: DOS attack flooding CDP table
260
261 2: NONDOS attack Setting up a virtual device
262
263
264 Attacks Implemented in HSRP:
265
266 0: NONDOS attack sending raw HSRP packet
267
268 1: NONDOS attack becoming ACTIVE router
269
270 2: NONDOS attack becoming ACTIVE router (MITM)
271
272
273 Attacks Implemented in DHCP:
274
275 0: NONDOS attack sending RAW packet
276
277 1: DOS attack sending DISCOVER packet
278
279 2: NONDOS attack creating DHCP rogue server
280
281 3: DOS attack sending RELEASE packet
282
283
284 Attacks Implemented in DTP:
285
286 0: NONDOS attack sending DTP packet
287
288 1: NONDOS attack enabling trunking
289
290
291 Attacks Implemented in 802.1Q:
292
293 0: NONDOS attack sending 802.1Q packet
294
295 1: NONDOS attack sending 802.1Q double enc. packet
296
297 2: DOS attack sending 802.1Q arp poisoning
298
299
300 Attacks Implemented in VTP:
301
302 0: NONDOS attack sending VTP packet
303
304 1: DOS attack deleting all VTP vlans
305
306 2: DOS attack deleting one vlan
307
308 3: NONDOS attack adding one vlan
309
310 4: DOS attack Catalyst zero day
311
312
313 Attacks Implemented in ISL:
314
315 None at the moment
316
317
319 The GTK GUI (-G) is a GTK graphical interface with all of the yersinia
320 powerful features and a professional 'look and feel'.
321
322
324 The ncurses GUI (-I) is a ncurses (or curses) based console where the
325 user can take advantage of yersinia powerful features.
326
327 Press 'h' to display the Help Screen and enjoy your session :)
328
330 The Network Daemon (-D) is a telnet based server (ala Cisco mode) that
331 listens by default in port 12000/tcp waiting for incoming telnet con‐
332 nections.
333
334 It supports a CLI similar to a Cisco device where the user (once
335 authenticated) can display different settings and can launch attacks
336 without having yersinia running in her own machine (specially useful
337 for Windows users).
338
340 - Send a Rapid Spanning-Tree BPDU with port role designated, port state
341 agreement, learning and port id 0x3000 to eth1:
342
343 yersinia stp -attack 0 -version 2 -flags 5c -portid 3000 -interface
344 eth1
345
346 - Start a Spanning-Tree nonDoS root claiming attack in the first non‐
347 loopback interface (keep in mind that this kind of attack will use the
348 first BPDU on the network interface to fill in the BPDU fields prop‐
349 erly):
350
351 yersinia stp -attack 4
352
353 - Start a Spanning-Tree DoS attack sending TCN BPDUs in the eth0 inter‐
354 face with MAC address 66:66:66:66:66:66:
355
356 yersinia stp -attack 3 -source 66:66:66:66:66:66
357
358
359
361 The README file contains more in-depth documentation about the attacks.
362
363
365 Yersinia is Copyright (c)
366
367
369 Lots
370
371
373 Alfredo Andres Omella <alfredo@yersinia.net>
374 David Barroso Berrueta <tomac@yersinia.net>
375
376
377
378Yersinia v0.7 $Date: 2006/02/17 22:48:40 $ YERSINIA(8)