Description:
While scouting around for new security tools, I chanced upon
Hyenae, a highly flexible and platform independent network packet generation tool written by Robin Richter. Hyenae allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.
In this video, I show you a demo of a DHCP Discover packet flooding attack using Hyenae on a windows platform. We will learn how to use Hyenae to conduct the attack and then verify the same with Wireshark.
You can download Hyenae from here. I would highly recommend that you try it out. Binaries are available for all OSs.
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments:
Thanks for the tutorial. I appreciate that you showed exactly how it works with wireshark.
Amazing video. I am doing my project on DDoS and the DHCP explanation makes even the dumbest person to understand concepts. However I am struggling to install this on fedora as I dont have the inbuilt libpcap packages.. I wish I has windows for my project.Things would have been a lot simpler.
Nice video
thanks for this video !!
i wonder how is it possible to avoid this attack?
Super good tutorial..!! Thank you. It shows how exactly it works. I found about this softwre from SANS security website.
Really good video and you explain things well, thank you :)