Skip to content
This repository has been archived by the owner on Jun 24, 2020. It is now read-only.
/ hyenae Public archive

Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.

License

Notifications You must be signed in to change notification settings

r-richter/hyenae

Repository files navigation

--------------------------------------------------------------------------------

                                Hyenae Readme

--------------------------------------------------------------------------------

  Hyenae
    Advanced Network Packet Generator

  Copyright (C) 2009 - 2010 Robin Richter

  Contact  : richterr@users.sourceforge.net
  Homepage : http://sourceforge.net/projects/hyenae/

--------------------------------------------------------------------------------

  1. About Hyenae

  Hyenae is a highly flexible and platform independent network packet generator.
  It allows you to reproduce low level ethernet attack scenarios (such as MITM,
  DoS and DDoS) to reveal potential security vulnerabilities of your network.
  Besides smart wildcard-based address randomization, a highly customizable
  packet generation control and an interactive attack assistant, Hyenae comes
  with a clusterable remote daemon for setting up distributed attack networks.

  Hyenae was developed with ease-of-use in mind while still remaining flexible
  and configurable. To realize this aim, Hyenae uses address patterns, which
  will minimize the number of arguments you have to provide because all
  necessary parameters, such as the way you want to randomize your addresses or
  the IP address version to use, can be derived from the pattern format you
  provided. See section 5, "Address Patterns", for more detailed information.

  This utility suite was developed only for network security testing purposes
  such as evaluation of firewall rules, flood detection and intrusion detection.
  Hyenae's developers disclaim all liability for any direct, indirect or
  consequential damages arising out of or connected with the use or misuse of
  Hyenae Utility Suite. The user alone assumes all risks and responsibility of
  his/her own actions associated with the use of the Hyenae Utility Suite. Every
  effort has been made to supply accurate information related to Hyenae. It is
  subject to change without prior notice.

--------------------------------------------------------------------------------

  2. Current Features

  * Platform independence
  * Assisted ARP-Request flood setup
  * Assisted ARP-Cache poisoning setup
  * Assisted PPPoE session initiation flood setup
  * Assisted Blind PPPoE session termination setup
  * Assisted ICMP-Echo flood setup
  * Assisted ICMP-Smurf attack setup
  * Assisted ICMP based TCP-Connection reset setup
  * Assisted TCP-SYN flood setup
  * Assisted TCP-Land attack setup
  * Assisted Blind TCP-Connection reset setup
  * Assisted UDP flood setup
  * Assisted DNS-Query flood setup
  * Assisted DHCP-Discover flood setup
  * Assisted DHCP starvation setup
  * Assisted DHCP-Release forcing setup
  * Assisted Cisco HSRP active router hijacking setup
  * Customizable ARP-Reply based attacks
  * Customizable PPPoE-Discover based attacks
  * Customizable ICMP-Echo based attacks (IPv4 and IPv6)
  * CUstomizable ICMP "Destination Unreachable" based attacks (IPv4)
  * Customizable TCP based attacks (IPv4 and IPv6)
  * Customizable UDP based attacks (IPv4 and IPv6)
  * Customizable DNS-Query based attacks (IPv4 and IPv6)
  * Customizable DHCP-Discover based attacks (IPv4)
  * Customizable DHCP-Request based attacks (IPv4)
  * Customizable DHCP-Release based attacks (IPv4)
  * Customizable Cisco HSRP-Hello based attacks (IPv4)
  * Customizable Cisco HSRP-Coup based attacks (IPv4)
  * Customizable Cisco HSRP-Resign based attacks (IPv4)
  * Random or fixed packet count and or attack duration
  * Random or fixed send delay for breaking flood detections
  * Pattern based packet address configuration
  * Intelligent address and address protocol detection
  * Smart wildcard-based randomization
  * Daemon for setting up remote attack networks
  * HyenaeFE QT-Frontend support

--------------------------------------------------------------------------------

  3. Command Line Usage (hyenae)

  hyenae (Starts attack assistant...)

  hyenae fe_stop (Creates a frontend stop condition file,
                  should only be used by the HyenaeFE frontend)

  hyenae -l (Prints all available network interfaces and exits)

  hyenae -L (Prints all available attacks and exits)

  hyenae -V (Prints version and exits)

  hyenae -a arp-reply
         -i | -I [Network interface name | index]
         -s [Src HW-Address]
         -d [Dst HW-Address]
         -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
         -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]

         OPTIONAL:
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a arp-request
         -i | -I [Network interface name | index]
         -s [Src HW-Address]
         -d [Dst HW-Address]
         -S [Snd HW-Address]-[Snd IP-Address (IPv4 only)]
         -D [Trg HW-Address]-[Trg IP-Address (IPv4 only)]

         OPTIONAL:
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a pppoe-discover
         -i | -I [Network interface name | index]
         -s [Src HW-Address]
         -d [Dst HW-Address]

         OPTIONAL:
         -o [PPPoE Discovery Code]
         -q [PPPoE Session ID Offset]
         -Q [PPPoE Session ID Incrementation Steps]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a icmp-echo
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -A [Assumed IP-Address version on random address strips]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a icmp-unreach-tcp
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
         -S [TCP Src HW-Address]-[TCP Src IP-Address (IPv4 only)]@[TCP Src Port]
         -D [TCP Dst HW-Address]-[TCP Dst IP-Address (IPv4 only)]@[TCP Dst Port]

         OPTIONAL:
         -o [ICMP Message Code]
         -t [IP Time To Live (TTL)]
         -k [TCP Achnkowledgement Number]
         -w [TCP Window Size]
         -q [TCP Sequence Number Offset]
         -Q [TCP Sequence Number Incrementation Steps]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a tcp
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]
         -f [TCP-Flags]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -k [TCP Achnkowledgement Number]
         -w [TCP Window Size]
         -q [TCP Sequence Number Offset]
         -Q [TCP Sequence Number Incrementation Steps]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -A [Assumed IP-Address version on random address strips]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a udp
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]@[Src Port]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]@[Dst Port]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -A [Assumed IP-Address version on random address strips]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a dns-query
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 or IPv6)]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 or IPv6)]
         -y [DNS query pattern]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -A [Assumed IP-Address version on random address strips]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a dhcp-discover
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -S [Req IP-Address (IPv4 only)]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a dhcp-request
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
         -D [Srv IP-Address (IPv4 only)]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -S [Req IP-Address (IPv4 only)]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a dhcp-release
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Dst HW-Address]-[Dst IP-Address (IPv4 only)]
         -D [Srv IP-Address (IPv4 only)]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a hsrp-hello
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Virtual IP-Address (IPv4 only)]
         -z [HSRP Priority]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -o [HSRP State Code]
         -h [HSRP Auth. Data]
         -g [HSRP Group Number]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a hsrp-coup
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Virtual IP-Address (IPv4 only)]
         -z [HSRP Priority]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -o [HSRP State Code]
         -h [HSRP Auth. Data]
         -g [HSRP Group Number]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

  hyenae -a hsrp-resign
         -i | -I [Network interface name | index]
         -s [Src HW-Address]-[Src IP-Address (IPv4 only)]
         -d [Virtual IP-Address (IPv4 only)]
         -z [HSRP Priority]

         OPTIONAL:
         -t [IP Time To Live (TTL)]
         -o [HSRP State Code]
         -h [HSRP Auth. Data]
         -g [HSRP Group Number]
         -p | -P [Random payload length | Payload file]
         -r | -R [remote daemon address (Single) | address file (Clustered)]
         -c [Min packet count]
         -C [Max packet count]
         -e [Min send delay (ms)]
         -E [Max send delay (ms)]
         -u [Min attack duration (ms)]
         -U [Max attack duration (ms)]
         -m (Set to ignore MTU limit)
         -N (Set for cold run)

    -s Source address pattern

    -d Destination address pattern. Is also used to define the virtual
       IP-Address pattern on HSRP based attacks.

    -S Secondary source address pattern. Defines the sender address on ARP-Based
       attacks, the requested IP-Address on DHCP-Request attacks and the TCP
       source address pattern on TCP based ICMP "Destination Unreachable"
       attacks.

    -D Secondary destination address pattern. Defines the target address on
       ARP-Based attacks, the server identifier (IP-Address) on DHCP-Release
       attacks and the TCP destination address pattern on TCP based ICMP
       "Destination Unreachable" attacks.

    -i Network interface to operate on (specified by name). This argument is
       ignored on remote attacks.

    -I Network interface to operate on (specified by index). A list
       of all available network interfaces and their indexes can be obtained
       by starting Hyenae with the -l option. This argument is ignored on remote
       attacks.

    -r Single remote attack. If set, Hyenae will execute the specified attack
       on the Hyenae Daemon specified by the given server address pattern. A
       server address pattern has the following pattern format:

         // For plain connections
         [IP-Address]@[Port]

         // For password protected daemons
         [IP-Addresss]@[Port]+[Password]

       Hyenae will automatically recognize the provided IP address version.
       Wildcards are not valid within server address patterns. The password
       strip is only required when connecting to a Hyenae Daemon which has
       activated password authentication. Note: Since Hyenae currently does not
       support encrypted communication, your password is transferred in plain
       text, and can be logged by others.

    -R Clustered remote attack. If set, Hyenae will simultaneously execute the
       specified attack using the Hyenae Daemons specified in the server file at
       the given path. A server list file should have the following format:

         # Comment
         Server=[IP-Address]@[Port]
         Server=[IP-Address]@[Port]+[Password]
         ...

       Hyenae will automatically recognize the version of the IP address
       provided. Wildcards are not valid within server address patterns. The
       password strip is only required when connecting to a Hyenae Daemon which
       has activated password authentication. Note: Since Hyenae currently does
       not support encrypted communication, your password is transferred in
       plain text, and can be logged by others.

    -a Attack protocol. A list of all available attacks can be obtained by
       starting Hyenae with the -L option.

    -A IP address version to assume when a completely random IP strip is found
       within an address pattern. This value can be either 4 or 6. By default
       this is set to 4 (IPv4).

    -t Defines the hop limit (TTL) on IP based attacks. The hop limit can be a
       value between 1 and 255. If not set, a hop limit size of 128 will be
       used.

    -o Defines the ICMP "Destination Unreachable" message code on ICMP
       "Destination Unreachable" based attacks, the PPPoE discover code on
       PPPoE-Discover based attacks or the HSRP state code on HSRP based
       attacks.

       Valid values on PPPoE attacks:

         padi (Active Discovery Initiation)
         padt (Active Discovery Termination)

         If not set, the default value is 'padi'.

       Valid values on ICMP attacks:

         network  (Network Unreachable)
         host     (Host Unreachable)
         protocol (Protocol Unreachable)
         port     (Port Unreachable)

         If not set, the default value is 'network'.

       Valid values on HSRP attacks:

         init
         learn
         listen
         speak
         standby
         active

         If not set, the default value is 'init'.

    -f TCP flags. This option is required on TCP attacks and defines the TCP
       control flags to set for the generated packets. Valid values are any
       combination of:

         F (FIN)
         S (SYN)
         R (RST)
         P (PSH)
         A (ACK)

    -k TCP acknowledgement number. Defines the TCP acknowledgement number to use
       on TCP based attacks. If not set or set to 0, an acknowledgement number
       of 0 will be used.

    -w TCP window size. Defines the TCP window size to use on TCP based attacks.
       If not set or set to 0, a window size of 0 will be used.

    -q TCP sequence number / PPPoE session id. Defines the TCP sequence number
       on TCP based, or the session id on PPPoE-Discover based attacks. If not
       set or set to 0 on TCP based attacks, every generated packet (unless a
       step value was given) will carry a completely randomized sequence number.
       If set to 0 on PPPoE attacks, every generated packet (unless a step value
       was given) will carry the session id 0. If a sequence number or session
       id incrementation step value was given, this argument will be used as
       the initial sequence number or session id to be incremented.

    -Q TCP sequence number / PPPoE session id incrementation steps. If set, the
       sequence number or session id of every generated packet will be
       incremented by the given value.

    -y DNS query pattern. A DNS query pattern is required on DNS-Query based
       attacks to define the list of domain names to query. The list should have
       the following format:

       # Single DNS query
       [www.domain1.com]

       # Multiple DNS queries
       [www.domain1.com],[www.domain2.com],...

    -h Defines the HSRP authentification data field value and is required on
       HSRP based attacks. If not set, the default auth. data will be used
       instead. Auth. data values must not be longer than 8 characters.

    -z Defines the HSRP priority field value and is required on HSRP based
       attacks. This value can be any number betwen 1 up to 255.

    -g Defines the HSRP group number on HSRP based attacks. This value can be
       any number betwen 0 up to 255. If not set, the group number will be set
       to 0.

    -c Minimum number of packets to generate. If not set or set to 0, an
       unlimited amount of packets will be generated, unless an attack duration
       was set. If you provide a maximum number of packets to generate, the
       minimum number of packets will be automatically set to one. If not set or
       set to 0 on remote attacks, the packet limit of the daemon will be used
       instead.

    -C Maximum number of packets to generate. If not set or set to 0, the
       specified minimum number of packets (-c X) will be generated. If no
       minimum number of packets to generate is specified, an unlimited
       amount of packets will be generated.

    -e Minimum number of milliseconds to wait until the next packet is sent.
       On HSRP based attacks the send delay will be used as the hello/hold time
       field value and must not be greater than 255000. The hold time on HSRP
       based attacks will be hello time multiplied by 3.

    -E Maximum number of milliseconds that may pass before the next packet is
       sent. If set, Hyenae will wait a random number of milliseconds between
       the minimum (-e X or 0 if not set) and the maximum number (-E X) before
       sending the next packet. This is useful for breaking flood detections.
       On HSRP based attacks the send delay will be used as the hello/hold time
       field value and must not be greater than 255000. The hold time on HSRP
       based attacks will be hello time multiplied by 3.

    -u Minimum attack duration in milliseconds. If not set or set to 0, the
       attack duration will be endless, unless a packet count was given. If not
       set or set to 0 on remote attacks, the attack duration limit of the
       daemon will be used instead.

    -U If set, Hyenae will stop the attack when a duration of a random number
       of milliseconds between the minimum (-u X or 0 if not set) and the
       maximum number (-U X) is reached.

    -p Random packet payload. If set, a random data block (payload) of the
       given length will be added to the generated packets (if supported by the
       chosen attack type). By default all packets will be generated with an
       empty data block.  If the total length of the packet (including the
       protocol headers) exceeds the MTU limit and Hyenae was called without the
       -m option, an error occurs. The total length of a packet depends on IP
       protocol and the attack type used. The default MTU limit is 1500 bytes.

    -P File-based packet payload. If set, the contents of a file at the
       given path will be added as the data block (payload) of the generated
       packets.  If the total length of the packet (including the protocol
       headers) exceeds the MTU limit and Hyenae was called without the -m
       option, an error occurs. The total length of a packet depends on IP
       protocol and the attack type used. The default MTU limit is 1500 bytes.

    -m If set, the default MTU limit of 1500 bytes will be ignored and even
       packets with a length greater than 1500 bytes will by sent. If the packet
       length exceeds the supported MTU limit, pcap will fail to write the data
       to the network. You should never provide this option unless you know what
       you are doing.

    -N No sending (cold run). If set, Hyenae will start a run through its attack
       routines without actually writing any data to the network. This can be
       very useful to pre-check the generated packets or the remote daemon
       behaviour before executing the actual attack.

    -l Prints a list of all available network interfaces and exits.

    -L Prints a list of all available attacks and exits.

    -V Prints the current version of Hyenae and exits.

--------------------------------------------------------------------------------

  4. Command Line Usage (hyenaed)

  hyenaed -l (Prints all available network interfaces and exits)

  hyenaed -V (Prints daemon version and exits)

  hyenaed -i | -I [Network interface name | index]
          -c &| -u [Packet count limit &| Attack duration limit]

         OPTIONAL:
          -a [IP-Address to bind to]
          -p [Port to listen on]
          -b [Max backlog connections]
          -t [Trusted IP-Address list file]
          -T [Untrusted IP-Address list file]
          -A [Assumed IP-Address version on random address strips]
          -m [Max client connections]
          -k [Deamon password]
          -f [log file]

    -i Network interface to attack on (specified by name). This will not set
       the network interface on which to listen for connections.

    -I Network interface to attack on (specified by index). This will not set
       the network interface on which to listen for connections. A list of all
       available network interfaces and their indexes can be obtained by
       starting Hyenae with the -l option.

    -a IP address to bind the daemon's server socket to. If not given, the
       daemon will bind to any capable network interface on this machine. The
       Hyenae Daemon can not be bound to the network interface you want to
       attack from.

    -p The port number on which the daemon shall listen for incoming
       connections. By default the daemon will listen on port 666.

    -b Number of backlog connections the daemon shall handle. The default
       value is 5.

    -t Trusted IP address list. Specifies an IP list file which will be used as
       a trusted list of IP addresses. If set, only clients using the specified
       IP addresses will be allowed to connect to the daemon. An IP address list
       has the following format:

         # Comment
         IP-Address=[IP-Address]
         IP-Address=[IP-Address]
         ...

       Wildcards are not valid within IP address list files.

    -T Untrusted IP address list. Specifies an IP list file which will be
       used as a list of untrusted IP addresses. If set, all clients using
       the specified IP addresses will not be able to connect to the daemon. An
       IP address list has the following format:

         # Comment
         IP-Address=[IP-Address]
         IP-Address=[IP-Address]
         ...

       Wildcards are not valid within IP address list files.

    -A IP version the listening socket shall use. This can be either 4 or 6.
       The default version is 4 (IPv4).

    -c Packet limit for clients. Specifies the maximum number of packets a
       single client can request to attack with. If not set or set to 0, you
       must specify an attack duration limit.

    -u Attack duration limit for clients. Specifies the maximum number of
       milliseconds a single client can request to attack for. If not set or set
       to 0, you must specify a packet limit.

    -m Maximum number of clients allowed to connect. The default value is 10.

    -k Password protection. If set, only clients which are using this password
       will be able to control this daemon. Note: Since Hyenae currently does
       not support encrypted communication, your password is transferred in
       plain text, and can be logged by others.

    -f Log-File path. By default, all daemon logs will be written to
       /var/log/hyenaed.log on *nix systems or .\hyenaed.log on windows
       systems.

    -l Prints a list of all available network interfaces and exits.

    -V Prints the current version of Hyenae and exits.

--------------------------------------------------------------------------------

  5. Address Patterns

  Hyenae uses address patterns to define the source and destination address
  (and for ARP-Replies, sender and target as well) of the generated packets.
  Each pattern can contain wildcards to randomize certain octets or even the
  whole address strip or port. Hyenae uses an address adequate randomization
  algorithm that makes sure to produce valid addresses. As an example, if you
  have a pattern with an IP address strip like 25%.168.0.1, Hyenae will
  recognize that it can only place a random value from 0 to 5 here. It will
  also use the required notation (decimal or hexadecimal) and detect that the
  specified address is an IPv4 address and will use the IPv4 protocol for the
  given attack (if possible). Address patterns can have the following formats:

    [HW-Address]-[IP-Address]@[Port]
    [HW-Address]-[IP-Address]
    [HW-Address]

  Hyenae will automatically recognize the pattern and even every single
  address format (HW, IPv4 or IPv4), so you don't have to pass extra arguments,
  since everything we need to know can be derived from the given pattern. If you
  want to randomize a complete address strip (HW-Address or IP-Address) simply
  put a single % in it:

    %-192.1%%.%.%%@%2%

  This one will use a random hardware address and a partially randomized IP
  address, adequate to the octet digits you specified. Notice that you can
  even specify the number of random octet digits to create (but make sure that
  the number of digits within the octet is valid for the used format), the last
  octet of the IP address strip will be a random 2 digit value. The same works
  within the port strip (separated by an '@'), the more wildcards you place,
  the more digits the random port number will have. In the example above, the
  port number will be 3 digits long and will also have a 2 within its center.
  Here are some examples:

    // Ok
    00:D2:F%:D4:DD:%%-192.168.%%.%@%%
    %-192.168.%%%.%@%%
    00:D2:F%:D4:DD:%%-%@%%
    %-%@%
    %-%

    // Error: HW address octets have a fixed length of 2 digits!
    00:%:00::00:00:00-192.168.0.1@21

  If you are using only a single wildcard as the IP address strip, Hyenae will
  generate a complete random IP address. By default, Hyenae will interpret or
  "assume" random IP address strips as IPv4 addresses. You can change the
  assumed version by calling Hyenae with the -A option.

  In some cases you will need to randomize a pattern equaly to another one. If
  you are generating ARP packets for example, the source hardware address needs
  equal the senders hardware address otherwise the packet will be droped by the
  target host. In such a case, Hyenae will use an equal randomization on both of
  the patterns (aas long as they match each other).

  // HW-Address randomization on ARP packets

  // HW-Address strip Will be equaly randomized
  Source Pattern: %
  Sender Pattern: %-192.168.0.1

  // HW-Address strip Will be equaly randomized
  Source Pattern: %%:22:33:44:55:66
  Sender Pattern: %%:22:33:44:55:66-192.168.0.1

  // HW-Adress strip won't be equaly randomized
  Source Pattern: 11:%%:33:44:55:66
  Sender Pattern: %%:22:33:44:55:66-192.168.0.1

--------------------------------------------------------------------------------

About

Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published