Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

Wednesday, January 6, 2016

Pyersinia - Network Attack Tool


Pyersinia is a similar tool to Yersinia, but Pyersinia is implemented in Python using Scapy. The main objective is the realization of network attacks such as spoofing ARP, DHCP DoS , STP DoS among others. The community can add new attacks on the tool in a simple way, using plugins. This is because Pyersinia uses the STB (Security Tools Builder) framework.

What's new?

Adding new attacks on the tool is a simple task because we use the framework STB (Security Tool Builder). The new attacks are added by plugins.

Installation

Install pyersinia is so easy:
$ python -m pip install pyersinia
Or install from Pypi:
# pip install pyersinia

Quick start

You can display inline help writing:

positional arguments:
arp_spoof_TARGET
arp_spoof_VICTIM

optional arguments:
-h, --help show this help message and exit
-v, --verbosity verbosity level
-a ATTACK_TYPE choose supported attack type
-i IFACE choose network interface

supported attacks:
arp_spoof, dhcp_discover_dos, stp_tcn, stp_conf, stp_root

examples:
python pyersinia.py -a arp_spoof 127.0.0.1 127.0.0.1
python pyersinia.py -a stp_root -i eth0



Share:

0 comentários:

Post a Comment

Note: Only a member of this blog may post a comment.

Copyright © Offensive Sec Blog | Powered by OffensiveSec
Design by OffSec | Theme by Nasa Records | Distributed By Pirate Edition