diff options
-rw-r--r-- | mausezahn.8 | 25 |
1 files changed, 14 insertions, 11 deletions
diff --git a/mausezahn.8 b/mausezahn.8 index 25e47ea..9595cb8 100644 --- a/mausezahn.8 +++ b/mausezahn.8 @@ -670,8 +670,8 @@ text using the -P option: mausezahn eth0 -t ip -P "Hello World" # ASCII payload mausezahn eth0 -t ip p=68:65:6c:6c:6f:20:77:6f:72:6c:64 # hex payload - mausezahn eth0 -t ip "proto=89, \ - p=68:65:6c:6c:6f:20:77:6f:72:6c:64, \ # same with other + mausezahn eth0 -t ip "proto=89, \\ + p=68:65:6c:6c:6f:20:77:6f:72:6c:64, \\ # same with other ttl=1" # IP arguments Note: The raw link access mode only accepts hex payloads (because you specify @@ -760,7 +760,7 @@ duplicate IP detection): ARP cache poisoning: - mausezahn eth0 -t arp "reply, senderip=192.168.0.1, targetmac=00:00:0c:01:02:03, \ + mausezahn eth0 -t arp "reply, senderip=192.168.0.1, targetmac=00:00:0c:01:02:03, \\ targetip=172.16.1.50" where by default your interface MAC address will be used as sendermac, @@ -815,7 +815,7 @@ QinQ encapsulations or VLAN hopping: Send a UDP packet with VLAN tags 100 Don't know if this is useful anywhere but at least it is possible: - mausezahn eth0 -t udp "dp=8888, sp=13442" -P "Mausezahn is great" \ + mausezahn eth0 -t udp "dp=8888, sp=13442" -P "Mausezahn is great" \\ -Q 6:5,7:732,5:331,5,6 Mix it with MPLS: @@ -907,12 +907,12 @@ packets. Here are some examples: Send test packets to the RTP port range: - mausezahn eth0 -B 192.168.1.1 -t udp "dp=16384-32767, \ + mausezahn eth0 -B 192.168.1.1 -t udp "dp=16384-32767, \\ p=A1:00:CC:00:00:AB:CD:EE:EE:DD:DD:00" Send a DNS request as local broadcast (often a local router replies): - mausezahn eth0 -t udp dp=53,p=c5-2f-01-00-00-01-00-00-00-00-00-00-03-77-77-\ + mausezahn eth0 -t udp dp=53,p=c5-2f-01-00-00-01-00-00-00-00-00-00-03-77-77-\\ 77-03-78-79-7a-03-63-6f-6d-00-00-01-00-01" Additionally you may specify the lenght and checksum using the len and sum @@ -940,8 +940,8 @@ you want to specify multiple flags. For example, a SYN-Flood attack against host 1.1.1.1 using a random source IP address and periodically using all 1023 well-known ports could be created via: - mausezahn eth0 -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn" \ - -P "Good morning! This is a SYN Flood Attack. \ + mausezahn eth0 -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn" \\ + -P "Good morning! This is a SYN Flood Attack. \\ We apologize for any inconvenience." Be careful with such SYN floods and only use them for firewall testing. Check @@ -951,7 +951,7 @@ sequence number (SQNR). If you want to try a DoS attack by sending a RST-flood and you do NOT know the target's initial SQNR (which is normally the case) then you may want to sweep through a range of sequence numbers: - mausezahn eth0 -A legal.host.com -B target.host.com \ + mausezahn eth0 -A legal.host.com -B target.host.com \\ -t tcp "sp=80,dp=80,s=1-4294967295" Fortunately, the SQNR must match the target host's acknowledgement number plus @@ -959,7 +959,7 @@ the announced window size. Since the typical window size is something between 40000 and 65535 you are MUCH quicker when using an increment using the ds argument: - mausezahn eth0 -A legal.host.com -B target.host.com \ + mausezahn eth0 -A legal.host.com -B target.host.com \\ -t tcp "sp=80, dp=80, s=1-4294967295, ds=40000" In the latter case mausezahn will only send 107375 packets instead of @@ -978,7 +978,7 @@ Here is an example of a simple query: You can also create server-type messages: - mausezahn eth0 -A spoofed.dns-server.com -B target.host.com \ + mausezahn eth0 -A spoofed.dns-server.com -B target.host.com \\ "q=www.topsecret.com, a=172.16.1.1" The syntax according to the online help (-t dns help) is: @@ -1101,6 +1101,9 @@ abuse mausezahn for 'unallowed' attacks and get caught, or damage something of your own, then this is completely your fault. So the safest solution is to try it out in a lab environment. +Also have a look at the netsniff-ng(8) note section on how you can properly +setup and tune your system. + .SH LEGAL mausezahn is licensed under the GNU GPL version 2.0. |