Penetration Testing mailing list archives

Re: Tool or Scirpt for DHCP Pool Exhaust Attack


From: "Nikhil Wagholikar" <visitnikhil () gmail com>
Date: Tue, 29 Apr 2008 09:28:17 +0530

Hello Shakti,

You can look forward for a tool called Yersinia for carrying out DHCP
Pool Exhaust Attack.

 Yersinia is a network tool designed to take advantage of some
weakness in different network protocols. Some of the protocols it
supports are:

Spanning Tree Protocol (STP)
Cisco Discovery Protocol (CDP)
Dynamic Trunking Protocol (DTP)
Dynamic Host Configuration Protocol (DHCP)
Hot Standby Router Protocol (HSRP)
IEEE 802.1Q
IEEE 802.1X
Inter-Switch Link Protocol (ISL)
VLAN Trunking Protocol (VTP)


More Information: http://www.yersinia.net/index.htm

Best of Luck !!

--
Nikhil Wagholikar
Head | Security Assessment Team
NII Consulting
Web: http://www.niiconsulting.com/
Security Products: http://www.niiconsulting.com/products.html


On Mon, Apr 7, 2008 at 1:44 PM, <shakti () pcssaudi com> wrote:
Hi all,


I am in search of a tool which can launch DHCP Pool Exhaust Attacks?


Please ping back if any one has a binary/or Source Code or Even Script for the same task.


------------------------------------

Thanks and Regards,


Shakti Prateek Sharma

CEH, CHFI, ECSA, ITIL

Security Consultant,

Saudi Paramount Computer Systems,

Riyadh, Saudi Arabia.

http://www.pcssaudi.com

------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------



------------------------------------------------------------------------
This list is sponsored by: Cenzic

Need to secure your web apps NOW?
Cenzic finds more, "real" vulnerabilities fast.
Click to try it, buy it or download a solution FREE today!

http://www.cenzic.com/downloads
------------------------------------------------------------------------


Current thread: