Win7下Hyenae的安装
(1)下载
链接:http://sourceforge.net/projects/hyenae/ 资源:hyenae-0.36-1_fe_0.1-1-win32.exe
(2)README
-------------------------------------------------------------------------------- Hyenae Readme -------------------------------------------------------------------------------- Hyenae
Advanced Network Packet Generator Copyright (C) 2009 - 2010 Robin Richter Contact : richterr@users.sourceforge.net
Homepage : http://sourceforge.net/projects/hyenae/ -------------------------------------------------------------------------------- 1. About Hyenae Hyenae is a highly flexible and platform independent network packet generator.
It allows you to reproduce low level ethernet attack scenarios (such as MITM,
DoS and DDoS) to reveal potential security vulnerabilities of your network.
Besides smart wildcard-based address randomization, a highly customizable
packet generation control and an interactive attack assistant, Hyenae comes
with a clusterable remote daemon for setting up distributed attack networks. Hyenae was developed with ease-of-use in mind while still remaining flexible
and configurable. To realize this aim, Hyenae uses address patterns, which
will minimize the number of arguments you have to provide because all
necessary parameters, such as the way you want to randomize your addresses or
the IP address version to use, can be derived from the pattern format you
provided. See section 5, "Address Patterns", for more detailed information. This utility suite was developed only for network security testing purposes
such as evaluation of firewall rules, flood detection and intrusion detection.
Hyenae's developers disclaim all liability for any direct, indirect or
consequential damages arising out of or connected with the use or misuse of
Hyenae Utility Suite. The user alone assumes all risks and responsibility of
his/her own actions associated with the use of the Hyenae Utility Suite. Every
effort has been made to supply accurate information related to Hyenae. It is
subject to change without prior notice. -------------------------------------------------------------------------------- 2. Current Features * Platform independence
* Assisted ARP-Request flood setup
* Assisted ARP-Cache poisoning setup
* Assisted PPPoE session initiation flood setup
* Assisted Blind PPPoE session termination setup
* Assisted ICMP-Echo flood setup
* Assisted ICMP-Smurf attack setup
* Assisted ICMP based TCP-Connection reset setup
* Assisted TCP-SYN flood setup
* Assisted TCP-Land attack setup
* Assisted Blind TCP-Connection reset setup
* Assisted UDP flood setup
* Assisted DNS-Query flood setup
* Assisted DHCP-Discover flood setup
* Assisted DHCP starvation setup
* Assisted DHCP-Release forcing setup
* Assisted Cisco HSRP active router hijacking setup
* Customizable ARP-Reply based attacks
* Customizable PPPoE-Discover based attacks
* Customizable ICMP-Echo based attacks (IPv4 and IPv6)
* CUstomizable ICMP "Destination Unreachable" based attacks (IPv4)
* Customizable TCP based attacks (IPv4 and IPv6)
* Customizable UDP based attacks (IPv4 and IPv6)
* Customizable DNS-Query based attacks (IPv4 and IPv6)
* Customizable DHCP-Discover based attacks (IPv4)
* Customizable DHCP-Request based attacks (IPv4)
* Customizable DHCP-Release based attacks (IPv4)
* Customizable Cisco HSRP-Hello based attacks (IPv4)
* Customizable Cisco HSRP-Coup based attacks (IPv4)
* Customizable Cisco HSRP-Resign based attacks (IPv4)
* Random or fixed packet count and or attack duration
* Random or fixed send delay for breaking flood detections
* Pattern based packet address configuration
* Intelligent address and address protocol detection
* Smart wildcard-based randomization
* Daemon for setting up remote attack networks
* HyenaeFE QT-Frontend support -------------------------------------------------------------------------------- 3. Command Line Usage (hyenae) hyenae (Starts attack assistant...) hyenae fe_stop (Creates a frontend stop condition file,
should only be used by the HyenaeFE frontend) hyenae -l (Prints all available network interfaces and exits) hyenae -L (Prints all available attacks and exits) hyenae -V (Prints version and exits) hyenae -a arp-reply
-i | -I [Network interface name | index]
-s [Src HW-Address]
-d [Dst HW-Address]
-S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
-D [Trg HW-Address]-[Trg IP-Address (IPv4 only)] OPTIONAL:
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a arp-request
-i | -I [Network interface name | index]
-s [Src HW-Address]
-d [Dst HW-Address]
-S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
-D [Trg HW-Address]-[Trg IP-Address (IPv4 only)] OPTIONAL:
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a pppoe-discover
-i | -I [Network interface name | index]
-s [Src HW-Address]
-d [Dst HW-Address] OPTIONAL:
-o [PPPoE Discovery Code]
-q [PPPoE Session ID Offset]
-Q [PPPoE Session ID Incrementation Steps]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a icmp-echo
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)] OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a icmp-unreach-tcp
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
-S [TCP Src HW-Address]-[TCP Src IP-Address (IPv4 only)]@[TCP Src Port]
-D [TCP Dst HW-Address]-[TCP Dst IP-Address (IPv4 only)]@[TCP Dst Port] OPTIONAL:
-o [ICMP Message Code]
-t [IP Time To Live (TTL)]
-k [TCP Achnkowledgement Number]
-w [TCP Window Size]
-q [TCP Sequence Number Offset]
-Q [TCP Sequence Number Incrementation Steps]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a tcp
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]
-f [TCP-Flags] OPTIONAL:
-t [IP Time To Live (TTL)]
-k [TCP Achnkowledgement Number]
-w [TCP Window Size]
-q [TCP Sequence Number Offset]
-Q [TCP Sequence Number Incrementation Steps]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a udp
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port] OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a dns-query
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]
-y [DNS query pattern] OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-A [Assumed IP-Address version on random address strips]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a dhcp-discover
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)] OPTIONAL:
-t [IP Time To Live (TTL)]
-S [Req IP-Address (IPv4 only)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a dhcp-request
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
-D [Srv IP-Address (IPv4 only)] OPTIONAL:
-t [IP Time To Live (TTL)]
-S [Req IP-Address (IPv4 only)]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a dhcp-release
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
-D [Srv IP-Address (IPv4 only)] OPTIONAL:
-t [IP Time To Live (TTL)]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a hsrp-hello
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Virtual IP-Address (IPv4 only)]
-z [HSRP Priority] OPTIONAL:
-t [IP Time To Live (TTL)]
-o [HSRP State Code]
-h [HSRP Auth. Data]
-g [HSRP Group Number]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a hsrp-coup
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Virtual IP-Address (IPv4 only)]
-z [HSRP Priority] OPTIONAL:
-t [IP Time To Live (TTL)]
-o [HSRP State Code]
-h [HSRP Auth. Data]
-g [HSRP Group Number]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) hyenae -a hsrp-resign
-i | -I [Network interface name | index]
-s [Src HW-Address]-[Src IP-Address (IPv4 only)]
-d [Virtual IP-Address (IPv4 only)]
-z [HSRP Priority] OPTIONAL:
-t [IP Time To Live (TTL)]
-o [HSRP State Code]
-h [HSRP Auth. Data]
-g [HSRP Group Number]
-p | -P [Random payload length | Payload file]
-r | -R [remote daemon address (Single) | address file (Clustered)]
-c [Min packet count]
-C [Max packet count]
-e [Min send delay (ms)]
-E [Max send delay (ms)]
-u [Min attack duration (ms)]
-U [Max attack duration (ms)]
-m (Set to ignore MTU limit)
-N (Set for cold run) -s Source address pattern -d Destination address pattern. Is also used to define the virtual
IP-Address pattern on HSRP based attacks. -S Secondary source address pattern. Defines the sender address on ARP-Based
attacks, the requested IP-Address on DHCP-Request attacks and the TCP
source address pattern on TCP based ICMP "Destination Unreachable"
attacks. -D Secondary destination address pattern. Defines the target address on
ARP-Based attacks, the server identifier (IP-Address) on DHCP-Release
attacks and the TCP destination address pattern on TCP based ICMP
"Destination Unreachable" attacks. -i Network interface to operate on (specified by name). This argument is
ignored on remote attacks. -I Network interface to operate on (specified by index). A list
of all available network interfaces and their indexes can be obtained
by starting Hyenae with the -l option. This argument is ignored on remote
attacks. -r Single remote attack. If set, Hyenae will execute the specified attack
on the Hyenae Daemon specified by the given server address pattern. A
server address pattern has the following pattern format: // For plain connections
[IP-Address]@[Port] // For password protected daemons
[IP-Addresss]@[Port]+[Password] Hyenae will automatically recognize the provided IP address version.
Wildcards are not valid within server address patterns. The password
strip is only required when connecting to a Hyenae Daemon which has
activated password authentication. Note: Since Hyenae currently does not
support encrypted communication, your password is transferred in plain
text, and can be logged by others. -R Clustered remote attack. If set, Hyenae will simultaneously execute the
specified attack using the Hyenae Daemons specified in the server file at
the given path. A server list file should have the following format: # Comment
Server=[IP-Address]@[Port]
Server=[IP-Address]@[Port]+[Password]
... Hyenae will automatically recognize the version of the IP address
provided. Wildcards are not valid within server address patterns. The
password strip is only required when connecting to a Hyenae Daemon which
has activated password authentication. Note: Since Hyenae currently does
not support encrypted communication, your password is transferred in
plain text, and can be logged by others. -a Attack protocol. A list of all available attacks can be obtained by
starting Hyenae with the -L option. -A IP address version to assume when a completely random IP strip is found
within an address pattern. This value can be either 4 or 6. By default
this is set to 4 (IPv4). -t Defines the hop limit (TTL) on IP based attacks. The hop limit can be a
value between 1 and 255. If not set, a hop limit size of 128 will be
used. -o Defines the ICMP "Destination Unreachable" message code on ICMP
"Destination Unreachable" based attacks, the PPPoE discover code on
PPPoE-Discover based attacks or the HSRP state code on HSRP based
attacks. Valid values on PPPoE attacks: padi (Active Discovery Initiation)
padt (Active Discovery Termination) If not set, the default value is 'padi'. Valid values on ICMP attacks: network (Network Unreachable)
host (Host Unreachable)
protocol (Protocol Unreachable)
port (Port Unreachable) If not set, the default value is 'network'. Valid values on HSRP attacks: init
learn
listen
speak
standby
active If not set, the default value is 'init'. -f TCP flags. This option is required on TCP attacks and defines the TCP
control flags to set for the generated packets. Valid values are any
combination of: F (FIN)
S (SYN)
R (RST)
P (PSH)
A (ACK) -k TCP acknowledgement number. Defines the TCP acknowledgement number to use
on TCP based attacks. If not set or set to 0, an acknowledgement number
of 0 will be used. -w TCP window size. Defines the TCP window size to use on TCP based attacks.
If not set or set to 0, a window size of 0 will be used. -q TCP sequence number / PPPoE session id. Defines the TCP sequence number
on TCP based, or the session id on PPPoE-Discover based attacks. If not
set or set to 0 on TCP based attacks, every generated packet (unless a
step value was given) will carry a completely randomized sequence number.
If set to 0 on PPPoE attacks, every generated packet (unless a step value
was given) will carry the session id 0. If a sequence number or session
id incrementation step value was given, this argument will be used as
the initial sequence number or session id to be incremented. -Q TCP sequence number / PPPoE session id incrementation steps. If set, the
sequence number or session id of every generated packet will be
incremented by the given value. -y DNS query pattern. A DNS query pattern is required on DNS-Query based
attacks to define the list of domain names to query. The list should have
the following format: # Single DNS query
[www.domain1.com] # Multiple DNS queries
[www.domain1.com],[www.domain2.com],... -h Defines the HSRP authentification data field value and is required on
HSRP based attacks. If not set, the default auth. data will be used
instead. Auth. data values must not be longer than 8 characters. -z Defines the HSRP priority field value and is required on HSRP based
attacks. This value can be any number betwen 1 up to 255. -g Defines the HSRP group number on HSRP based attacks. This value can be
any number betwen 0 up to 255. If not set, the group number will be set
to 0. -c Minimum number of packets to generate. If not set or set to 0, an
unlimited amount of packets will be generated, unless an attack duration
was set. If you provide a maximum number of packets to generate, the
minimum number of packets will be automatically set to one. If not set or
set to 0 on remote attacks, the packet limit of the daemon will be used
instead. -C Maximum number of packets to generate. If not set or set to 0, the
specified minimum number of packets (-c X) will be generated. If no
minimum number of packets to generate is specified, an unlimited
amount of packets will be generated. -e Minimum number of milliseconds to wait until the next packet is sent.
On HSRP based attacks the send delay will be used as the hello/hold time
field value and must not be greater than 255000. The hold time on HSRP
based attacks will be hello time multiplied by 3. -E Maximum number of milliseconds that may pass before the next packet is
sent. If set, Hyenae will wait a random number of milliseconds between
the minimum (-e X or 0 if not set) and the maximum number (-E X) before
sending the next packet. This is useful for breaking flood detections.
On HSRP based attacks the send delay will be used as the hello/hold time
field value and must not be greater than 255000. The hold time on HSRP
based attacks will be hello time multiplied by 3. -u Minimum attack duration in milliseconds. If not set or set to 0, the
attack duration will be endless, unless a packet count was given. If not
set or set to 0 on remote attacks, the attack duration limit of the
daemon will be used instead. -U If set, Hyenae will stop the attack when a duration of a random number
of milliseconds between the minimum (-u X or 0 if not set) and the
maximum number (-U X) is reached. -p Random packet payload. If set, a random data block (payload) of the
given length will be added to the generated packets (if supported by the
chosen attack type). By default all packets will be generated with an
empty data block. If the total length of the packet (including the
protocol headers) exceeds the MTU limit and Hyenae was called without the
-m option, an error occurs. The total length of a packet depends on IP
protocol and the attack type used. The default MTU limit is 1500 bytes. -P File-based packet payload. If set, the contents of a file at the
given path will be added as the data block (payload) of the generated
packets. If the total length of the packet (including the protocol
headers) exceeds the MTU limit and Hyenae was called without the -m
option, an error occurs. The total length of a packet depends on IP
protocol and the attack type used. The default MTU limit is 1500 bytes. -m If set, the default MTU limit of 1500 bytes will be ignored and even
packets with a length greater than 1500 bytes will by sent. If the packet
length exceeds the supported MTU limit, pcap will fail to write the data
to the network. You should never provide this option unless you know what
you are doing. -N No sending (cold run). If set, Hyenae will start a run through its attack
routines without actually writing any data to the network. This can be
very useful to pre-check the generated packets or the remote daemon
behaviour before executing the actual attack. -l Prints a list of all available network interfaces and exits. -L Prints a list of all available attacks and exits. -V Prints the current version of Hyenae and exits. -------------------------------------------------------------------------------- 4. Command Line Usage (hyenaed) hyenaed -l (Prints all available network interfaces and exits) hyenaed -V (Prints daemon version and exits) hyenaed -i | -I [Network interface name | index]
-c &| -u [Packet count limit &| Attack duration limit] OPTIONAL:
-a [IP-Address to bind to]
-p [Port to listen on]
-b [Max backlog connections]
-t [Trusted IP-Address list file]
-T [Untrusted IP-Address list file]
-A [Assumed IP-Address version on random address strips]
-m [Max client connections]
-k [Deamon password]
-f [log file] -i Network interface to attack on (specified by name). This will not set
the network interface on which to listen for connections. -I Network interface to attack on (specified by index). This will not set
the network interface on which to listen for connections. A list of all
available network interfaces and their indexes can be obtained by
starting Hyenae with the -l option. -a IP address to bind the daemon's server socket to. If not given, the
daemon will bind to any capable network interface on this machine. The
Hyenae Daemon can not be bound to the network interface you want to
attack from. -p The port number on which the daemon shall listen for incoming
connections. By default the daemon will listen on port 666. -b Number of backlog connections the daemon shall handle. The default
value is 5. -t Trusted IP address list. Specifies an IP list file which will be used as
a trusted list of IP addresses. If set, only clients using the specified
IP addresses will be allowed to connect to the daemon. An IP address list
has the following format: # Comment
IP-Address=[IP-Address]
IP-Address=[IP-Address]
... Wildcards are not valid within IP address list files. -T Untrusted IP address list. Specifies an IP list file which will be
used as a list of untrusted IP addresses. If set, all clients using
the specified IP addresses will not be able to connect to the daemon. An
IP address list has the following format: # Comment
IP-Address=[IP-Address]
IP-Address=[IP-Address]
... Wildcards are not valid within IP address list files. -A IP version the listening socket shall use. This can be either 4 or 6.
The default version is 4 (IPv4). -c Packet limit for clients. Specifies the maximum number of packets a
single client can request to attack with. If not set or set to 0, you
must specify an attack duration limit. -u Attack duration limit for clients. Specifies the maximum number of
milliseconds a single client can request to attack for. If not set or set
to 0, you must specify a packet limit. -m Maximum number of clients allowed to connect. The default value is 10. -k Password protection. If set, only clients which are using this password
will be able to control this daemon. Note: Since Hyenae currently does
not support encrypted communication, your password is transferred in
plain text, and can be logged by others. -f Log-File path. By default, all daemon logs will be written to
/var/log/hyenaed.log on *nix systems or .\hyenaed.log on windows
systems. -l Prints a list of all available network interfaces and exits. -V Prints the current version of Hyenae and exits. -------------------------------------------------------------------------------- 5. Address Patterns Hyenae uses address patterns to define the source and destination address
(and for ARP-Replies, sender and target as well) of the generated packets.
Each pattern can contain wildcards to randomize certain octets or even the
whole address strip or port. Hyenae uses an address adequate randomization
algorithm that makes sure to produce valid addresses. As an example, if you
have a pattern with an IP address strip like 25%.168.0.1, Hyenae will
recognize that it can only place a random value from 0 to 5 here. It will
also use the required notation (decimal or hexadecimal) and detect that the
specified address is an IPv4 address and will use the IPv4 protocol for the
given attack (if possible). Address patterns can have the following formats: [HW-Address]-[IP-Address]@[Port]
[HW-Address]-[IP-Address]
[HW-Address] Hyenae will automatically recognize the pattern and even every single
address format (HW, IPv4 or IPv4), so you don't have to pass extra arguments,
since everything we need to know can be derived from the given pattern. If you
want to randomize a complete address strip (HW-Address or IP-Address) simply
put a single % in it: %-192.1%%.%.%%@%2% This one will use a random hardware address and a partially randomized IP
address, adequate to the octet digits you specified. Notice that you can
even specify the number of random octet digits to create (but make sure that
the number of digits within the octet is valid for the used format), the last
octet of the IP address strip will be a random 2 digit value. The same works
within the port strip (separated by an '@'), the more wildcards you place,
the more digits the random port number will have. In the example above, the
port number will be 3 digits long and will also have a 2 within its center.
Here are some examples: // Ok
00:D2:F%:D4:DD:%%-192.168.%%.%@%%
%-192.168.%%%.%@%%
00:D2:F%:D4:DD:%%-%@%%
%-%@%
%-% // Error: HW address octets have a fixed length of 2 digits!
00:%:00::00:00:00-192.168.0.1@21 If you are using only a single wildcard as the IP address strip, Hyenae will
generate a complete random IP address. By default, Hyenae will interpret or
"assume" random IP address strips as IPv4 addresses. You can change the
assumed version by calling Hyenae with the -A option. In some cases you will need to randomize a pattern equaly to another one. If
you are generating ARP packets for example, the source hardware address needs
equal the senders hardware address otherwise the packet will be droped by the
target host. In such a case, Hyenae will use an equal randomization on both of
the patterns (aas long as they match each other). // HW-Address randomization on ARP packets // HW-Address strip Will be equaly randomized
Source Pattern: %
Sender Pattern: %-192.168.0.1 // HW-Address strip Will be equaly randomized
Source Pattern: %%:22:33:44:55:66
Sender Pattern: %%:22:33:44:55:66-192.168.0.1 // HW-Adress strip won't be equaly randomized
Source Pattern: 11:%%:33:44:55:66
Sender Pattern: %%:22:33:44:55:66-192.168.0.1 --------------------------------------------------------------------------------
Win7下Hyenae的安装的更多相关文章
- win7下IIS的安装和配置 图文教程
转自 http://www.jb51.net/article/29787.htm 最近工作需要IIS,自己的电脑又是Windows7系统,找了下安装的方法,已经安装成功.在博客里记录一下,给需要的 ...
- WIN7 下 Qt Creator 安装 QWT
WIN7 下 Qt Creator 安装 QWT 环境:WIN7 +QT Creator2.6.2 1.下载QWT源代码 qwt-6.1-rc3.zip 2 编译QWT open projects- ...
- win7下IIS的安装和配置
win7下IIS的安装和配置 图文教程,需要的朋友可以参考下 http://www.jb51.net/article/29787.htm 最近工作需要IIS,自己的电脑又是Windows7系统,找了下 ...
- Win7下MongoDB的安装和使用
Win7下MongoDB的安装和使用 1.下载: http://www.mongodb.org/downloads 2.安装: 安装目录为 D:\mongodb\MongoDB 2.6 Standar ...
- Win7下IIS的安装与配置
win7下IIS的安装和配置 图文教程,需要的朋友可以参考下 一.首先是安装IIS.打开控制面板,找到“程序与功能”,点进去 二.点击左侧“打开或关闭Windows功能” 三.找到“Internet ...
- win7下利用VM8安装CentOS6.3配置静态IP上网
1 环境 宿主主机64位win7,利用VM8安装的64位CentOS6.3,64位的.在VM中配置CentOS的IP为静态,可上互联网.具体配置过程如下. 2 步骤 首先将VM的setting选项中, ...
- <转> win7下破解已安装的VS2008
http://renfan.blog.51cto.com/3466724/754301 在win7系统下,已安装的VS2008维护界面是不显示序列号输入的,需要按以下步骤进行才能破解 1.点击“卸载/ ...
- win7下docker环境安装
最近公司涉及到对docker容器引擎的使用,所以就在网上各种搜索,由于是win7系统,所以在使用上更是麻烦,遇到各种错误就是无法成功启动docker,经过两天的各种尝试下,终于安装成功,在此记录一下使 ...
- win7下python2.7安装 pip,setuptools的正确方法
windows7 下 0.先安装python2.7.13 32位:https://www.python.org/ftp/python/2.7.13/python-2.7.13.msi 64位:htt ...
随机推荐
- Jmeter学习(二)
1. Jmeter预置知识-http协议 应用层协议http,ftp,smtp 1) http之url http 超文本传输协议,基于请求与响应模式的,无状态,应用层协议. http url: htt ...
- Oracle Data Guard的配置
概述 Oracle Data Guard 是针对企业数据库的最有效和最全面的数据可用性.数据保护和灾难恢复解决方案.它提供管理.监视和自动化软件基础架构来创建和维护一个或多个同步备用数据库,从而保护数 ...
- mybatis入门_一对多,多对多映射以及整合spring框架
一.一对多映射. 1.1 一对多映射之根据多的一方关联查询一的一方 示例:查询出具体的订单信息,同时也查询出来订单的用户信息. 引入的订单表如下所示: 框选出来的为具体的外键. 订单的Pojo类如下所 ...
- 控制移动端页面的缩放(meta)
meta标签中的content属性里有一个width=device-width的值,这个值就是用来告诉浏览器,该页面将要使用设备的宽度来解析,后面的属性值则是告诉该页面: user-scalable= ...
- 新手如何查看API文档?
Java API文档为例: 1:知道包名,可以在Overview里直接找到这个包,然后去查这个包下面的类和方法.2:知道类名和方法名,可以在Index.html里直接去找这个类或方法,然后查看.3:如 ...
- C++编程小知识随手记
C++编程小知识点: (1)queue和vector类型: 加入元素 : queue是queue.push(),vector是vector.push_back(), 删除元素: queue是queue ...
- maven 使用
1. download maven from http://maven.apache.org/ 2. unzip, setup MAVEN_HOME 3. change the configurati ...
- javascript 之 prototype 浅析
prototype 原型 javascript 是一种 prototype based programming 的语言, 而与我们通常的 class based programming 有很大 的区别 ...
- ubuntu16.04安装virtualbox5.1失败 gcc:error:unrecognized command line option ‘-fstack-protector-strong’
系统:ubuntu16.04.1 软件:Virtualbox-5.1 编译器:GCC 4.7.4 在如上环境下安装Vbx5.1提示我在终端执行/sbin/vboxconfig命令 照做 出现如下err ...
- android-studio-bundle-141.1980579-windows download Site
https://dl.google.com/dl/android/studio/install/1.2.2.0/android-studio-bundle-141.1980579-windows.ex ...