1 [COPY] --- T2-COPYRIGHT-NOTE-BEGIN ---
2 [COPY] T2 SDE: package/*/yersinia/yersinia.desc
3 [COPY] Copyright (C) 2006 - 2021 The T2 SDE Project
5 [COPY] This Copyright note is generated by scripts/Create-CopyPatch,
6 [COPY] more information can be found in the files COPYING and README.
8 [COPY] This program is free software; you can redistribute it and/or modify
9 [COPY] it under the terms of the GNU General Public License version 2.
10 [COPY] --- T2-COPYRIGHT-NOTE-END ---
12 [I] A framework for layer 2 attacks
14 [T] Yersinia implements several attacks for the following protocols:
15 [T] Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host
16 [T] Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking
17 [T] (DTP), 802.1q, Inter-Switch Link Protocol (ISL), and VLAN Trunking
18 [T] (VTP). It helps the pen-tester in different tasks, such as becoming
19 [T] the root role in the Spanning Tree, creating virtual CDP neighbors,
20 [T] setting up rogue DHCP servers, becoming the active router in a HSRP
21 [T] scenario, enabling trunk, performing ARP spoofing over VLAN hopping,
22 [T] adding or deleting VLANs (via VTP), and more.
24 [U] http://www.yersinia.net
26 [A] David Barroso Berrueta "tomac" <tomac@wasahero.org>
27 [M] The T2 Project <t2@t2-project.org>
34 [P] X -----5---9 800.000
37 [D] 4b9ee9c1fbad2168d91a5b151cf942902de7dc803ea87c171e9b6604 yersinia-0.7.1.tar.gz http://www.yersinia.net/download/