This repository has been archived by the owner on Jun 24, 2020. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 6
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
License
r-richter/hyenae
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
-------------------------------------------------------------------------------- Hyenae Readme -------------------------------------------------------------------------------- Hyenae Advanced Network Packet Generator Copyright (C) 2009 - 2010 Robin Richter Contact : richterr@users.sourceforge.net Homepage : http://sourceforge.net/projects/hyenae/ -------------------------------------------------------------------------------- 1. About Hyenae Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level ethernet attack scenarios (such as MITM, DoS and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks. Hyenae was developed with ease-of-use in mind while still remaining flexible and configurable. To realize this aim, Hyenae uses address patterns, which will minimize the number of arguments you have to provide because all necessary parameters, such as the way you want to randomize your addresses or the IP address version to use, can be derived from the pattern format you provided. See section 5, "Address Patterns", for more detailed information. This utility suite was developed only for network security testing purposes such as evaluation of firewall rules, flood detection and intrusion detection. Hyenae's developers disclaim all liability for any direct, indirect or consequential damages arising out of or connected with the use or misuse of Hyenae Utility Suite. The user alone assumes all risks and responsibility of his/her own actions associated with the use of the Hyenae Utility Suite. Every effort has been made to supply accurate information related to Hyenae. It is subject to change without prior notice. -------------------------------------------------------------------------------- 2. Current Features * Platform independence * Assisted ARP-Request flood setup * Assisted ARP-Cache poisoning setup * Assisted PPPoE session initiation flood setup * Assisted Blind PPPoE session termination setup * Assisted ICMP-Echo flood setup * Assisted ICMP-Smurf attack setup * Assisted ICMP based TCP-Connection reset setup * Assisted TCP-SYN flood setup * Assisted TCP-Land attack setup * Assisted Blind TCP-Connection reset setup * Assisted UDP flood setup * Assisted DNS-Query flood setup * Assisted DHCP-Discover flood setup * Assisted DHCP starvation setup * Assisted DHCP-Release forcing setup * Assisted Cisco HSRP active router hijacking setup * Customizable ARP-Reply based attacks * Customizable PPPoE-Discover based attacks * Customizable ICMP-Echo based attacks (IPv4 and IPv6) * CUstomizable ICMP "Destination Unreachable" based attacks (IPv4) * Customizable TCP based attacks (IPv4 and IPv6) * Customizable UDP based attacks (IPv4 and IPv6) * Customizable DNS-Query based attacks (IPv4 and IPv6) * Customizable DHCP-Discover based attacks (IPv4) * Customizable DHCP-Request based attacks (IPv4) * Customizable DHCP-Release based attacks (IPv4) * Customizable Cisco HSRP-Hello based attacks (IPv4) * Customizable Cisco HSRP-Coup based attacks (IPv4) * Customizable Cisco HSRP-Resign based attacks (IPv4) * Random or fixed packet count and or attack duration * Random or fixed send delay for breaking flood detections * Pattern based packet address configuration * Intelligent address and address protocol detection * Smart wildcard-based randomization * Daemon for setting up remote attack networks * HyenaeFE QT-Frontend support -------------------------------------------------------------------------------- 3. Command Line Usage (hyenae) hyenae (Starts attack assistant...) hyenae fe_stop (Creates a frontend stop condition file, should only be used by the HyenaeFE frontend) hyenae -l (Prints all available network interfaces and exits) hyenae -L (Prints all available attacks and exits) hyenae -V (Prints version and exits) hyenae -a arp-reply -i | -I [Network interface name | index] -s [Src HW-Address] -d [Dst HW-Address] -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)] -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)] OPTIONAL: -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a arp-request -i | -I [Network interface name | index] -s [Src HW-Address] -d [Dst HW-Address] -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)] -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)] OPTIONAL: -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a pppoe-discover -i | -I [Network interface name | index] -s [Src HW-Address] -d [Dst HW-Address] OPTIONAL: -o [PPPoE Discovery Code] -q [PPPoE Session ID Offset] -Q [PPPoE Session ID Incrementation Steps] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a icmp-echo -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)] -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)] OPTIONAL: -t [IP Time To Live (TTL)] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -A [Assumed IP-Address version on random address strips] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a icmp-unreach-tcp -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)] -S [TCP Src HW-Address]-[TCP Src IP-Address (IPv4 only)]@[TCP Src Port] -D [TCP Dst HW-Address]-[TCP Dst IP-Address (IPv4 only)]@[TCP Dst Port] OPTIONAL: -o [ICMP Message Code] -t [IP Time To Live (TTL)] -k [TCP Achnkowledgement Number] -w [TCP Window Size] -q [TCP Sequence Number Offset] -Q [TCP Sequence Number Incrementation Steps] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a tcp -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port] -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port] -f [TCP-Flags] OPTIONAL: -t [IP Time To Live (TTL)] -k [TCP Achnkowledgement Number] -w [TCP Window Size] -q [TCP Sequence Number Offset] -Q [TCP Sequence Number Incrementation Steps] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -A [Assumed IP-Address version on random address strips] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a udp -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port] -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port] OPTIONAL: -t [IP Time To Live (TTL)] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -A [Assumed IP-Address version on random address strips] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a dns-query -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)] -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)] -y [DNS query pattern] OPTIONAL: -t [IP Time To Live (TTL)] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -A [Assumed IP-Address version on random address strips] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a dhcp-discover -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)] OPTIONAL: -t [IP Time To Live (TTL)] -S [Req IP-Address (IPv4 only)] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a dhcp-request -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)] -D [Srv IP-Address (IPv4 only)] OPTIONAL: -t [IP Time To Live (TTL)] -S [Req IP-Address (IPv4 only)] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a dhcp-release -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)] -D [Srv IP-Address (IPv4 only)] OPTIONAL: -t [IP Time To Live (TTL)] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a hsrp-hello -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Virtual IP-Address (IPv4 only)] -z [HSRP Priority] OPTIONAL: -t [IP Time To Live (TTL)] -o [HSRP State Code] -h [HSRP Auth. Data] -g [HSRP Group Number] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a hsrp-coup -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Virtual IP-Address (IPv4 only)] -z [HSRP Priority] OPTIONAL: -t [IP Time To Live (TTL)] -o [HSRP State Code] -h [HSRP Auth. Data] -g [HSRP Group Number] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) hyenae -a hsrp-resign -i | -I [Network interface name | index] -s [Src HW-Address]-[Src IP-Address (IPv4 only)] -d [Virtual IP-Address (IPv4 only)] -z [HSRP Priority] OPTIONAL: -t [IP Time To Live (TTL)] -o [HSRP State Code] -h [HSRP Auth. Data] -g [HSRP Group Number] -p | -P [Random payload length | Payload file] -r | -R [remote daemon address (Single) | address file (Clustered)] -c [Min packet count] -C [Max packet count] -e [Min send delay (ms)] -E [Max send delay (ms)] -u [Min attack duration (ms)] -U [Max attack duration (ms)] -m (Set to ignore MTU limit) -N (Set for cold run) -s Source address pattern -d Destination address pattern. Is also used to define the virtual IP-Address pattern on HSRP based attacks. -S Secondary source address pattern. Defines the sender address on ARP-Based attacks, the requested IP-Address on DHCP-Request attacks and the TCP source address pattern on TCP based ICMP "Destination Unreachable" attacks. -D Secondary destination address pattern. Defines the target address on ARP-Based attacks, the server identifier (IP-Address) on DHCP-Release attacks and the TCP destination address pattern on TCP based ICMP "Destination Unreachable" attacks. -i Network interface to operate on (specified by name). This argument is ignored on remote attacks. -I Network interface to operate on (specified by index). A list of all available network interfaces and their indexes can be obtained by starting Hyenae with the -l option. This argument is ignored on remote attacks. -r Single remote attack. If set, Hyenae will execute the specified attack on the Hyenae Daemon specified by the given server address pattern. A server address pattern has the following pattern format: // For plain connections [IP-Address]@[Port] // For password protected daemons [IP-Addresss]@[Port]+[Password] Hyenae will automatically recognize the provided IP address version. Wildcards are not valid within server address patterns. The password strip is only required when connecting to a Hyenae Daemon which has activated password authentication. Note: Since Hyenae currently does not support encrypted communication, your password is transferred in plain text, and can be logged by others. -R Clustered remote attack. If set, Hyenae will simultaneously execute the specified attack using the Hyenae Daemons specified in the server file at the given path. A server list file should have the following format: # Comment Server=[IP-Address]@[Port] Server=[IP-Address]@[Port]+[Password] ... Hyenae will automatically recognize the version of the IP address provided. Wildcards are not valid within server address patterns. The password strip is only required when connecting to a Hyenae Daemon which has activated password authentication. Note: Since Hyenae currently does not support encrypted communication, your password is transferred in plain text, and can be logged by others. -a Attack protocol. A list of all available attacks can be obtained by starting Hyenae with the -L option. -A IP address version to assume when a completely random IP strip is found within an address pattern. This value can be either 4 or 6. By default this is set to 4 (IPv4). -t Defines the hop limit (TTL) on IP based attacks. The hop limit can be a value between 1 and 255. If not set, a hop limit size of 128 will be used. -o Defines the ICMP "Destination Unreachable" message code on ICMP "Destination Unreachable" based attacks, the PPPoE discover code on PPPoE-Discover based attacks or the HSRP state code on HSRP based attacks. Valid values on PPPoE attacks: padi (Active Discovery Initiation) padt (Active Discovery Termination) If not set, the default value is 'padi'. Valid values on ICMP attacks: network (Network Unreachable) host (Host Unreachable) protocol (Protocol Unreachable) port (Port Unreachable) If not set, the default value is 'network'. Valid values on HSRP attacks: init learn listen speak standby active If not set, the default value is 'init'. -f TCP flags. This option is required on TCP attacks and defines the TCP control flags to set for the generated packets. Valid values are any combination of: F (FIN) S (SYN) R (RST) P (PSH) A (ACK) -k TCP acknowledgement number. Defines the TCP acknowledgement number to use on TCP based attacks. If not set or set to 0, an acknowledgement number of 0 will be used. -w TCP window size. Defines the TCP window size to use on TCP based attacks. If not set or set to 0, a window size of 0 will be used. -q TCP sequence number / PPPoE session id. Defines the TCP sequence number on TCP based, or the session id on PPPoE-Discover based attacks. If not set or set to 0 on TCP based attacks, every generated packet (unless a step value was given) will carry a completely randomized sequence number. If set to 0 on PPPoE attacks, every generated packet (unless a step value was given) will carry the session id 0. If a sequence number or session id incrementation step value was given, this argument will be used as the initial sequence number or session id to be incremented. -Q TCP sequence number / PPPoE session id incrementation steps. If set, the sequence number or session id of every generated packet will be incremented by the given value. -y DNS query pattern. A DNS query pattern is required on DNS-Query based attacks to define the list of domain names to query. The list should have the following format: # Single DNS query [www.domain1.com] # Multiple DNS queries [www.domain1.com],[www.domain2.com],... -h Defines the HSRP authentification data field value and is required on HSRP based attacks. If not set, the default auth. data will be used instead. Auth. data values must not be longer than 8 characters. -z Defines the HSRP priority field value and is required on HSRP based attacks. This value can be any number betwen 1 up to 255. -g Defines the HSRP group number on HSRP based attacks. This value can be any number betwen 0 up to 255. If not set, the group number will be set to 0. -c Minimum number of packets to generate. If not set or set to 0, an unlimited amount of packets will be generated, unless an attack duration was set. If you provide a maximum number of packets to generate, the minimum number of packets will be automatically set to one. If not set or set to 0 on remote attacks, the packet limit of the daemon will be used instead. -C Maximum number of packets to generate. If not set or set to 0, the specified minimum number of packets (-c X) will be generated. If no minimum number of packets to generate is specified, an unlimited amount of packets will be generated. -e Minimum number of milliseconds to wait until the next packet is sent. On HSRP based attacks the send delay will be used as the hello/hold time field value and must not be greater than 255000. The hold time on HSRP based attacks will be hello time multiplied by 3. -E Maximum number of milliseconds that may pass before the next packet is sent. If set, Hyenae will wait a random number of milliseconds between the minimum (-e X or 0 if not set) and the maximum number (-E X) before sending the next packet. This is useful for breaking flood detections. On HSRP based attacks the send delay will be used as the hello/hold time field value and must not be greater than 255000. The hold time on HSRP based attacks will be hello time multiplied by 3. -u Minimum attack duration in milliseconds. If not set or set to 0, the attack duration will be endless, unless a packet count was given. If not set or set to 0 on remote attacks, the attack duration limit of the daemon will be used instead. -U If set, Hyenae will stop the attack when a duration of a random number of milliseconds between the minimum (-u X or 0 if not set) and the maximum number (-U X) is reached. -p Random packet payload. If set, a random data block (payload) of the given length will be added to the generated packets (if supported by the chosen attack type). By default all packets will be generated with an empty data block. If the total length of the packet (including the protocol headers) exceeds the MTU limit and Hyenae was called without the -m option, an error occurs. The total length of a packet depends on IP protocol and the attack type used. The default MTU limit is 1500 bytes. -P File-based packet payload. If set, the contents of a file at the given path will be added as the data block (payload) of the generated packets. If the total length of the packet (including the protocol headers) exceeds the MTU limit and Hyenae was called without the -m option, an error occurs. The total length of a packet depends on IP protocol and the attack type used. The default MTU limit is 1500 bytes. -m If set, the default MTU limit of 1500 bytes will be ignored and even packets with a length greater than 1500 bytes will by sent. If the packet length exceeds the supported MTU limit, pcap will fail to write the data to the network. You should never provide this option unless you know what you are doing. -N No sending (cold run). If set, Hyenae will start a run through its attack routines without actually writing any data to the network. This can be very useful to pre-check the generated packets or the remote daemon behaviour before executing the actual attack. -l Prints a list of all available network interfaces and exits. -L Prints a list of all available attacks and exits. -V Prints the current version of Hyenae and exits. -------------------------------------------------------------------------------- 4. Command Line Usage (hyenaed) hyenaed -l (Prints all available network interfaces and exits) hyenaed -V (Prints daemon version and exits) hyenaed -i | -I [Network interface name | index] -c &| -u [Packet count limit &| Attack duration limit] OPTIONAL: -a [IP-Address to bind to] -p [Port to listen on] -b [Max backlog connections] -t [Trusted IP-Address list file] -T [Untrusted IP-Address list file] -A [Assumed IP-Address version on random address strips] -m [Max client connections] -k [Deamon password] -f [log file] -i Network interface to attack on (specified by name). This will not set the network interface on which to listen for connections. -I Network interface to attack on (specified by index). This will not set the network interface on which to listen for connections. A list of all available network interfaces and their indexes can be obtained by starting Hyenae with the -l option. -a IP address to bind the daemon's server socket to. If not given, the daemon will bind to any capable network interface on this machine. The Hyenae Daemon can not be bound to the network interface you want to attack from. -p The port number on which the daemon shall listen for incoming connections. By default the daemon will listen on port 666. -b Number of backlog connections the daemon shall handle. The default value is 5. -t Trusted IP address list. Specifies an IP list file which will be used as a trusted list of IP addresses. If set, only clients using the specified IP addresses will be allowed to connect to the daemon. An IP address list has the following format: # Comment IP-Address=[IP-Address] IP-Address=[IP-Address] ... Wildcards are not valid within IP address list files. -T Untrusted IP address list. Specifies an IP list file which will be used as a list of untrusted IP addresses. If set, all clients using the specified IP addresses will not be able to connect to the daemon. An IP address list has the following format: # Comment IP-Address=[IP-Address] IP-Address=[IP-Address] ... Wildcards are not valid within IP address list files. -A IP version the listening socket shall use. This can be either 4 or 6. The default version is 4 (IPv4). -c Packet limit for clients. Specifies the maximum number of packets a single client can request to attack with. If not set or set to 0, you must specify an attack duration limit. -u Attack duration limit for clients. Specifies the maximum number of milliseconds a single client can request to attack for. If not set or set to 0, you must specify a packet limit. -m Maximum number of clients allowed to connect. The default value is 10. -k Password protection. If set, only clients which are using this password will be able to control this daemon. Note: Since Hyenae currently does not support encrypted communication, your password is transferred in plain text, and can be logged by others. -f Log-File path. By default, all daemon logs will be written to /var/log/hyenaed.log on *nix systems or .\hyenaed.log on windows systems. -l Prints a list of all available network interfaces and exits. -V Prints the current version of Hyenae and exits. -------------------------------------------------------------------------------- 5. Address Patterns Hyenae uses address patterns to define the source and destination address (and for ARP-Replies, sender and target as well) of the generated packets. Each pattern can contain wildcards to randomize certain octets or even the whole address strip or port. Hyenae uses an address adequate randomization algorithm that makes sure to produce valid addresses. As an example, if you have a pattern with an IP address strip like 25%.168.0.1, Hyenae will recognize that it can only place a random value from 0 to 5 here. It will also use the required notation (decimal or hexadecimal) and detect that the specified address is an IPv4 address and will use the IPv4 protocol for the given attack (if possible). Address patterns can have the following formats: [HW-Address]-[IP-Address]@[Port] [HW-Address]-[IP-Address] [HW-Address] Hyenae will automatically recognize the pattern and even every single address format (HW, IPv4 or IPv4), so you don't have to pass extra arguments, since everything we need to know can be derived from the given pattern. If you want to randomize a complete address strip (HW-Address or IP-Address) simply put a single % in it: %-192.1%%.%.%%@%2% This one will use a random hardware address and a partially randomized IP address, adequate to the octet digits you specified. Notice that you can even specify the number of random octet digits to create (but make sure that the number of digits within the octet is valid for the used format), the last octet of the IP address strip will be a random 2 digit value. The same works within the port strip (separated by an '@'), the more wildcards you place, the more digits the random port number will have. In the example above, the port number will be 3 digits long and will also have a 2 within its center. Here are some examples: // Ok 00:D2:F%:D4:DD:%%-192.168.%%.%@%% %-192.168.%%%.%@%% 00:D2:F%:D4:DD:%%-%@%% %-%@% %-% // Error: HW address octets have a fixed length of 2 digits! 00:%:00::00:00:00-192.168.0.1@21 If you are using only a single wildcard as the IP address strip, Hyenae will generate a complete random IP address. By default, Hyenae will interpret or "assume" random IP address strips as IPv4 addresses. You can change the assumed version by calling Hyenae with the -A option. In some cases you will need to randomize a pattern equaly to another one. If you are generating ARP packets for example, the source hardware address needs equal the senders hardware address otherwise the packet will be droped by the target host. In such a case, Hyenae will use an equal randomization on both of the patterns (aas long as they match each other). // HW-Address randomization on ARP packets // HW-Address strip Will be equaly randomized Source Pattern: % Sender Pattern: %-192.168.0.1 // HW-Address strip Will be equaly randomized Source Pattern: %%:22:33:44:55:66 Sender Pattern: %%:22:33:44:55:66-192.168.0.1 // HW-Adress strip won't be equaly randomized Source Pattern: 11:%%:33:44:55:66 Sender Pattern: %%:22:33:44:55:66-192.168.0.1 --------------------------------------------------------------------------------
About
Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
Topics
Resources
License
Stars
Watchers
Forks
Packages 0
No packages published