yersinia 0.7.3-1 source package in Ubuntu
Changelog
yersinia (0.7.3-1) unstable; urgency=low * took package from Raphael because he wants to orphan it * Ackknowledge NMU from Kumar: Thank you! Closes: #527762 * new upstream release 0.7.3 which fixes the interface and interaction problem. Closes: #694762 * debian/control added homepage: field Closes: #615299 * fix some lintian warnings. Thanks for the hints Closes: #548997 -- Noël Köthe <email address hidden> Wed, 30 Oct 2013 18:53:19 +0100
Upload details
- Uploaded by:
- Noël Köthe
- Uploaded to:
- Sid
- Original maintainer:
- Noël Köthe
- Architectures:
- any
- Section:
- admin
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Trusty | release | universe | utils |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
yersinia_0.7.3-1.dsc | 1.7 KiB | 1e66427c8dd5642670aba6503a6711a429fdc8b0c1a7f5aeef9f228798feea63 |
yersinia_0.7.3.orig.tar.gz | 371.2 KiB | 46d23a41df28d4b9814722ec91175c58fbc7b3f1499b2cee6a96e4b821bf4c41 |
yersinia_0.7.3-1.diff.gz | 4.3 KiB | 36f3e245361645c92faa93ad3a517312934c47e17a12dd5d9b310fa0e0cf2e73 |
Available diffs
- diff from 0.7.1-1.1 (in Ubuntu) to 0.7.3-1 (133.1 KiB)
No changes file available.
Binary packages built by this source
- yersinia: Network vulnerabilities check software
Yersinia is a framework for performing layer 2 attacks. It is designed
to take advantage of some weakeness in different network protocols. It
pretends to be a solid framework for analyzing and testing the deployed
networks and systems.
.
Attacks for the following network protocols are implemented in this
particular release:
- Spanning Tree Protocol (STP).
- Cisco Discovery Protocol (CDP).
- Dynamic Trunking Protocol (DTP).
- Dynamic Host Configuration Protocol (DHCP).
- Hot Standby Router Protocol (HSRP).
- 802.1q.
- 802.1x.
- Inter-Switch Link Protocol (ISL).
- VLAN Trunking Protocol (VTP).
- yersinia-dbgsym: debug symbols for package yersinia
Yersinia is a framework for performing layer 2 attacks. It is designed
to take advantage of some weakeness in different network protocols. It
pretends to be a solid framework for analyzing and testing the deployed
networks and systems.
.
Attacks for the following network protocols are implemented in this
particular release:
- Spanning Tree Protocol (STP).
- Cisco Discovery Protocol (CDP).
- Dynamic Trunking Protocol (DTP).
- Dynamic Host Configuration Protocol (DHCP).
- Hot Standby Router Protocol (HSRP).
- 802.1q.
- 802.1x.
- Inter-Switch Link Protocol (ISL).
- VLAN Trunking Protocol (VTP).