Hyenae:网络数据包生成器!!!

软件介绍:

Hyenae是一种高度灵活和平台独立的网络数据包发生器。它允许你复制水平低以太网攻击的情况(如MITM , DOS ,和的DDoS )揭示您的网络中潜在的安全漏洞。


实验环境:

vmware workstation 11

centos6.5的系统下  

SecureCRT (ssh远程连接软件)


软件安装:

官网链接:

https://packetstormsecurity.com/files/download/93515/hyenae-0.35-2.tar.gz


解压

[root@Master ~]# tar zxvf  hyenae-0.35-2.tar.gz

hyenae-0.35-2/

hyenae-0.35-2/aclocal.m4

hyenae-0.35-2/._ChangeLog

hyenae-0.35-2/ChangeLog

hyenae-0.35-2/config.h.in

hyenae-0.35-2/configure

hyenae-0.35-2/._configure.ac

。。。。。。


切换到解压目录

[root@Master ~]# cd hyenae-0.35-2


配置:

[root@Master hyenae-0.35-2]# ./configure

。。。。。。。

checking for eth_set in -ldnet... no

checking for eth_set in -ldumbnet... no

configure: error: Missing library: libdnet/libdumbnet

出现上面报错。


解决它:

[root@Master hyenae-0.35-2]# yum install -y libdnet*

安装完成以后再次进行配置


[root@Master hyenae-0.35-2]# ./configure

。。。。。。。

checking for pcap.h... yes

configure: creating ./config.status

config.status: creating Makefile

config.status: creating man/Makefile

config.status: creating src/Makefile

config.status: creating config.h

config.status: executing depfiles commands

可以看到配置成功了。


编译安装。

[root@Master hyenae-0.35-2]# make && make install

make  all-recursive

make[1]: Entering directory `/root/hyenae-0.35-2'

Making all in man

make[2]: Entering directory `/root/hyenae-0.35-2/man'

make[2]: Nothing to be done for `all'.

make[2]: Leaving directory `/root/hyenae-0.35-2/man'

Making all in src

。。。。。


  /usr/bin/install -c 'hyenaed' '/usr/local/bin/hyenaed'

make[2]: Nothing to be done for `install-data-am'.

make[2]: Leaving directory `/root/hyenae-0.35-2/src'

make[1]: Leaving directory `/root/hyenae-0.35-2/src'

make[1]: Entering directory `/root/hyenae-0.35-2'

make[2]: Entering directory `/root/hyenae-0.35-2'

make[2]: Nothing to be done for `install-exec-am'.

test -z "/usr/local/share/doc/hyenae" || /bin/mkdir -p "/usr/local/share/doc/hyenae"

 /usr/bin/install -c -m 644 'HOWTO' '/usr/local/share/doc/hyenae/HOWTO'

 /usr/bin/install -c -m 644 'README' '/usr/local/share/doc/hyenae/README'

 /usr/bin/install -c -m 644 'LICENSE' '/usr/local/share/doc/hyenae/LICENSE'

make[2]: Leaving directory `/root/hyenae-0.35-2'

make[1]: Leaving directory `/root/hyenae-0.35-2'


出现上面的输出就 成功了。



hyena的帮助文档。

[root@Master hyenae-0.35-2]# hyenae  --help

* Initializing

hyenae: invalid option -- '-'

usage: hyenae (Starts attack assistant...)


       hyenae -l (Prints all available network interfaces and exits)

        #打印所有可用的网络接口


       hyenae -L (Prints all available attacks and exits)

        #打印所有可用的攻击

       hyenae -V (Prints version and exits)

        #打印版本号

       hyenae -a arp-reply

              -i | -I [Network interface name | index]

              -s [Src HW-Address]

              -d [Dst HW-Address]

              -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]

              -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]


              OPTIONAL:

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a arp-request

              -i | -I [Network interface name | index]

              -s [Src HW-Address]

              -d [Dst HW-Address]

              -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]

              -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]


              OPTIONAL:

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a pppoe-discover

              -i | -I [Network interface name | index]

              -s [Src HW-Address]

              -d [Dst HW-Address]


              OPTIONAL:

              -o [PPPoE Discovery Code]

              -q [PPPoE Session ID Offset]

              -Q [PPPoE Session ID Incrementation Steps]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a icmp-echo

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -A [Assumed IP-Address version on random address strips]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a icmp-unreach-tcp

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]

              -S [TCP Src HW-Address]-[TCP Src IP-Address (IPv4 only)]@[TCP Src Port]

              -D [TCP Dst HW-Address]-[TCP Dst IP-Address (IPv4 only)]@[TCP Dst Port]


              OPTIONAL:

              -o [ICMP Message Code]

              -t [IP Time To Live (TTL)]

              -k [TCP Achnkowledgement Number]

              -w [TCP Window Size]

              -q [TCP Sequence Number Offset]

              -Q [TCP Sequence Number Incrementation Steps]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a tcp

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]

              -f [TCP-Flags]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -k [TCP Achnkowledgement Number]

              -w [TCP Window Size]

              -q [TCP Sequence Number Offset]

              -Q [TCP Sequence Number Incrementation Steps]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -A [Assumed IP-Address version on random address strips]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a udp

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -A [Assumed IP-Address version on random address strips]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a dns-query

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]

              -y [DNS query pattern]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -A [Assumed IP-Address version on random address strips]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a dhcp-discover

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -S [IP-Address (IPv4 only)]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a dhcp-request

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]

              -D [Req IP-Address (IPv4 only)]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -S [IP-Address (IPv4 only)]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a dhcp-release

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]

              -D [Srv IP-Address (IPv4 only)]


              OPTIONAL:

              -t [IP Time To Live (TTL)]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a hsrp-hello

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Virtual IP-Address (IPv4 only)]

              -z [HSRP Priority]


              OPTIONAL:

              -o [HSRP State Code]

              -t [IP Time To Live (TTL)]

              -h [HSRP Auth. Data]

              -g [HSRP Group Number]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a hsrp-coup

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Virtual IP-Address (IPv4 only)]

              -z [HSRP Priority]


              OPTIONAL:

              -o [HSRP State Code]

              -t [IP Time To Live (TTL)]

              -h [HSRP Auth. Data]

              -g [HSRP Group Number]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)


       hyenae -a hsrp-resign

              -i | -I [Network interface name | index]

              -s [Src HW-Address]-[Src IP-Address (IPv4 only)]

              -d [Virtual IP-Address (IPv4 only)]

              -z [HSRP Priority]


              OPTIONAL:

              -o [HSRP State Code]

              -t [IP Time To Live (TTL)]

              -h [HSRP Auth. Data]

              -g [HSRP Group Number]

              -p | -P [Random payload length | Payload file]

              -r | -R [remote daemon address (Single) | address file (Clustered)]

              -c [Min packet count]

              -C [Max packet count]

              -e [Min send delay (ms)]

              -E [Max send delay (ms)]

              -u [Min attack duration (ms)]

              -U [Max attack duration (ms)]

              -m (Set to ignore MTU limit)

              -N (Set for cold run)




简单的使用(交互式的情景下):

[root@Master hyenae-0.35-2]# hyenae

* Initializing

* Starting attack assistant


  Select operation mode:

  > 1. Local

  > 2. Remote (Single Daemon)

  > 3. Remote (Multiple Daemons)


  Enter option [1-3]: 1


  Select network interface:

  > 1. eth1

  > 2. usbmon1

  > 3. usbmon2

  > 4. any

  > 5. lo


  Enter option [1-5]: 1


  Select IP version:

  > 1. IPv4

  > 2. IPv6


  Enter option [1-3]: 1


  Is packet route NAT-Free?


  Say 'n' here if the target machine is on a

  different subnet than you such as hosts on the internet.


  Enter choice [y or n]: y


  Is network EAP-Free?


  Say 'n' here if the network you are on is using the

  Extensible Authentication Protocol (EAP). This would be

  the case if you are connected with a wireless network card.


  Enter choice [y or n]: y


  Select attack type:

  > 1.  ARP-Request flood                   DoS

  > 2.  ARP-Cache poisoning                 MITM

  > 3.  PPPoE session initiation flood      DoS

  > 4.  Blind PPPoE session termination     DoS

  > 5.  ICMPv4-Echo flood                   DoS

  > 6.  ICMPv4-Smurf attack                 DDoS

  > 7.  ICMPv4 based TCP-Connection reset   DoS

  > 8.  TCP-SYN flood                       DoS

  > 9.  TCP-Land attack                     DoS

  > 10. Blind TCP-Connection reset          DoS

  > 11. UDP flood                           DoS

  > 12. DNS-Query flood                     DoS

  > 13. DHCP-Discover flood                 DoS

  > 14. DHCP starvation                     DoS

  > 15. DHCP-Release forcing                DoS

  > 16. Cisco HSRP active router hijacking  DoS


  Enter option [1-16]: 1


  Enter target pattern:


    Pattern format:

      [IP-Address]


  For additional informations about address patterns 

  and wilcard based randomization see README or man pages.


  > 192.168.0.26


  Activate random send delay?


  A random send delay can be usefull to break

  flood detection mechanisms but will slow down 

  the packet rate of the attack.


  Enter choice [y or n]: y


  Attack usage:


    hyenae -I 1 -a arp-request -A 4

           -s % -d ff:ff:ff:ff:ff:ff

           -S %-% -D ff:ff:ff:ff:ff:ff

           -E 1000


  Would you like to execute the attack now?


  Enter choice [y or n]: y


* Opening network interface (eth1)

* Launching attack


  Press any key to stop




* Finished: 83368 packets sent (3501456 bytes) in 15.409 seconds

You have new mail in /var/spool/mail/root



我们可以利用它模拟大量的网络流量,网上对于它的介绍比较少,我的能力也有限,所以只是简单的介绍了一下。希望大家能熟练的应用。





你可能感兴趣的:(测试,安全,数据包)