设为首页 收藏本站
查看: 2154|回复: 0

[经验分享] Hyenae:网络数据包生成器

[复制链接]
累计签到:1 天
连续签到:1 天
发表于 2016-4-12 09:04:22 | 显示全部楼层 |阅读模式
软件介绍:
Hyenae是一种高度灵活和平台独立的网络数据包发生器。它允许你复制水平低以太网攻击的情况(如MITM , DOS ,和的DDoS )揭示您的网络中潜在的安全漏洞。

实验环境:
vmware workstation 11
centos6.5的系统下  
SecureCRT (ssh远程连接软件)

软件安装:
官网链接:
https://packetstormsecurity.com/ ... yenae-0.35-2.tar.gz

解压
[iyunv@Master ~]# tar zxvf  hyenae-0.35-2.tar.gz
hyenae-0.35-2/
hyenae-0.35-2/aclocal.m4
hyenae-0.35-2/._ChangeLog
hyenae-0.35-2/ChangeLog
hyenae-0.35-2/config.h.in
hyenae-0.35-2/configure
hyenae-0.35-2/._configure.ac
。。。。。。

切换到解压目录
[iyunv@Master ~]# cd hyenae-0.35-2

配置:
[iyunv@Master hyenae-0.35-2]# ./configure
。。。。。。。

checking for eth_set in -ldnet... no
checking for eth_set in -ldumbnet... no
configure: error: Missing library: libdnet/libdumbnet
出现上面报错。

解决它:
[iyunv@Master hyenae-0.35-2]# yum install -y libdnet*
安装完成以后再次进行配置

[iyunv@Master hyenae-0.35-2]# ./configure
。。。。。。。
checking for pcap.h... yes
configure: creating ./config.status
config.status: creating Makefile
config.status: creating man/Makefile
config.status: creating src/Makefile
config.status: creating config.h
config.status: executing depfiles commands
可以看到配置成功了。

编译安装。
[iyunv@Master hyenae-0.35-2]# make && make install
make  all-recursive
make[1]: Entering directory `/root/hyenae-0.35-2'
Making all in man
make[2]: Entering directory `/root/hyenae-0.35-2/man'
make[2]: Nothing to be done for `all'.
make[2]: Leaving directory `/root/hyenae-0.35-2/man'
Making all in src
。。。。。

  /usr/bin/install -c 'hyenaed' '/usr/local/bin/hyenaed'
make[2]: Nothing to be done for `install-data-am'.
make[2]: Leaving directory `/root/hyenae-0.35-2/src'
make[1]: Leaving directory `/root/hyenae-0.35-2/src'
make[1]: Entering directory `/root/hyenae-0.35-2'
make[2]: Entering directory `/root/hyenae-0.35-2'
make[2]: Nothing to be done for `install-exec-am'.
test -z "/usr/local/share/doc/hyenae" || /bin/mkdir -p "/usr/local/share/doc/hyenae"
/usr/bin/install -c -m 644 'HOWTO' '/usr/local/share/doc/hyenae/HOWTO'
/usr/bin/install -c -m 644 'README' '/usr/local/share/doc/hyenae/README'
/usr/bin/install -c -m 644 'LICENSE' '/usr/local/share/doc/hyenae/LICENSE'
make[2]: Leaving directory `/root/hyenae-0.35-2'
make[1]: Leaving directory `/root/hyenae-0.35-2'

出现上面的输出就 成功了。


hyena的帮助文档。
[iyunv@Master hyenae-0.35-2]# hyenae  --help
* Initializing
hyenae: invalid option -- '-'
usage: hyenae (Starts attack assistant...)

       hyenae -l (Prints all available network interfaces and exits)
        #打印所有可用的网络接口

       hyenae -L (Prints all available attacks and exits)
        #打印所有可用的攻击
       hyenae -V (Prints version and exits)
        #打印版本号

       hyenae -a arp-reply
              -i | -I [Network interface name | index]
              -s [Src HW-Address]
              -d [Dst HW-Address]
              -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
              -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]

              OPTIONAL:
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a arp-request
              -i | -I [Network interface name | index]
              -s [Src HW-Address]
              -d [Dst HW-Address]
              -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
              -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]

              OPTIONAL:
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a pppoe-discover
              -i | -I [Network interface name | index]
              -s [Src HW-Address]
              -d [Dst HW-Address]

              OPTIONAL:
              -o [PPPoE Discovery Code]
              -q [PPPoE Session ID Offset]
              -Q [PPPoE Session ID Incrementation Steps]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a icmp-echo
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -A [Assumed IP-Address version on random address strips]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a icmp-unreach-tcp
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
              -S [TCP Src HW-Address]-[TCP Src IP-Address (IPv4 only)]@[TCP Src Port]
              -D [TCP Dst HW-Address]-[TCP Dst IP-Address (IPv4 only)]@[TCP Dst Port]

              OPTIONAL:
              -o [ICMP Message Code]
              -t [IP Time To Live (TTL)]
              -k [TCP Achnkowledgement Number]
              -w [TCP Window Size]
              -q [TCP Sequence Number Offset]
              -Q [TCP Sequence Number Incrementation Steps]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a tcp
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]
              -f [TCP-Flags]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -k [TCP Achnkowledgement Number]
              -w [TCP Window Size]
              -q [TCP Sequence Number Offset]
              -Q [TCP Sequence Number Incrementation Steps]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -A [Assumed IP-Address version on random address strips]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a udp
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -A [Assumed IP-Address version on random address strips]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a dns-query
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]
              -y [DNS query pattern]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -A [Assumed IP-Address version on random address strips]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a dhcp-discover
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -S [IP-Address (IPv4 only)]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a dhcp-request
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
              -D [Req IP-Address (IPv4 only)]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -S [IP-Address (IPv4 only)]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a dhcp-release
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
              -D [Srv IP-Address (IPv4 only)]

              OPTIONAL:
              -t [IP Time To Live (TTL)]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a hsrp-hello
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Virtual IP-Address (IPv4 only)]
              -z [HSRP Priority]

              OPTIONAL:
              -o [HSRP State Code]
              -t [IP Time To Live (TTL)]
              -h [HSRP Auth. Data]
              -g [HSRP Group Number]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a hsrp-coup
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Virtual IP-Address (IPv4 only)]
              -z [HSRP Priority]

              OPTIONAL:
              -o [HSRP State Code]
              -t [IP Time To Live (TTL)]
              -h [HSRP Auth. Data]
              -g [HSRP Group Number]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)

       hyenae -a hsrp-resign
              -i | -I [Network interface name | index]
              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
              -d [Virtual IP-Address (IPv4 only)]
              -z [HSRP Priority]

              OPTIONAL:
              -o [HSRP State Code]
              -t [IP Time To Live (TTL)]
              -h [HSRP Auth. Data]
              -g [HSRP Group Number]
              -p | -P [Random payload length | Payload file]
              -r | -R [remote daemon address (Single) | address file (Clustered)]
              -c [Min packet count]
              -C [Max packet count]
              -e [Min send delay (ms)]
              -E [Max send delay (ms)]
              -u [Min attack duration (ms)]
              -U [Max attack duration (ms)]
              -m (Set to ignore MTU limit)
              -N (Set for cold run)



简单的使用(交互式的情景下):

[iyunv@Master hyenae-0.35-2]# hyenae
* Initializing
* Starting attack assistant

  Select operation mode:
  > 1. Local
  > 2. Remote (Single Daemon)
  > 3. Remote (Multiple Daemons)

  Enter option [1-3]: 1

  Select network interface:
  > 1. eth1
  > 2. usbmon1
  > 3. usbmon2
  > 4. any
  > 5. lo

  Enter option [1-5]: 1

  Select IP version:
  > 1. IPv4
  > 2. IPv6

  Enter option [1-3]: 1

  Is packet route NAT-Free?

  Say 'n' here if the target machine is on a
  different subnet than you such as hosts on the internet.

  Enter choice [y or n]: y

  Is network EAP-Free?

  Say 'n' here if the network you are on is using the
  Extensible Authentication Protocol (EAP). This would be
  the case if you are connected with a wireless network card.

  Enter choice [y or n]: y

  Select attack type:
  > 1.  ARP-Request flood                   DoS
  > 2.  ARP-Cache poisoning                 MITM
  > 3.  PPPoE session initiation flood      DoS
  > 4.  Blind PPPoE session termination     DoS
  > 5.  ICMPv4-Echo flood                   DoS
  > 6.  ICMPv4-Smurf attack                 DDoS
  > 7.  ICMPv4 based TCP-Connection reset   DoS
  > 8.  TCP-SYN flood                       DoS
  > 9.  TCP-Land attack                     DoS
  > 10. Blind TCP-Connection reset          DoS
  > 11. UDP flood                           DoS
  > 12. DNS-Query flood                     DoS
  > 13. DHCP-Discover flood                 DoS
  > 14. DHCP starvation                     DoS
  > 15. DHCP-Release forcing                DoS
  > 16. Cisco HSRP active router hijacking  DoS

  Enter option [1-16]: 1

  Enter target pattern:

    Pattern format:
      [IP-Address]

  For additional informations about address patterns
  and wilcard based randomization see README or man pages.

  > 192.168.0.26

  Activate random send delay?

  A random send delay can be usefull to break
  flood detection mechanisms but will slow down
  the packet rate of the attack.

  Enter choice [y or n]: y

  Attack usage:

    hyenae -I 1 -a arp-request -A 4
           -s % -d ff:ff:ff:ff:ff:ff
           -S %-% -D ff:ff:ff:ff:ff:ff
           -E 1000

  Would you like to execute the attack now?

  Enter choice [y or n]: y

* Opening network interface (eth1)
* Launching attack

  Press any key to stop



* Finished: 83368 packets sent (3501456 bytes) in 15.409 seconds
You have new mail in /var/spool/mail/root


我们可以利用它模拟大量的网络流量,网上对于它的介绍比较少,我的能力也有限,所以只是简单的介绍了一下。希望大家能熟练的应用。




运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-202875-1-1.html 上篇帖子: ubuntu上使用词典 下篇帖子: ubuntu下安装ant 生成器 数据包 网络
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表