yersinia
TLDR
Start interactive ncurses mode
SYNOPSIS
yersinia [-hVGID] [protocol] [-attack attack] [options]
DESCRIPTION
yersinia is a framework for performing Layer 2 network attacks. It exploits weaknesses in network protocols that operate at the data link layer, which are often overlooked in security assessments.
The tool supports multiple attack modes: interactive ncurses console (-I), GTK graphical interface (-G), network daemon (-D), and direct command-line execution. Interactive mode displays protocol fields and available attacks with indicators for which are DoS attacks.
Common attacks include DHCP starvation (exhausting IP pools), STP root bridge claiming (traffic interception), DTP trunk negotiation (VLAN access), and CDP flooding (switch table overflow). These attacks can disrupt network operations or enable man-in-the-middle positions.
PARAMETERS
-h, --help
Display help-V, --Version
Show version-G
Start GTK graphical interface-I
Start ncurses interactive mode-D
Start as network daemon (telnet server on port 12000)-e
Execute attack without interactive mode-i INTERFACE
Network interface to use-l FILE
Log output to file-r FILE
Read packets from pcap file-w FILE
Write packets to pcap file-attack NUM
Attack number to execute
PROTOCOLS
stp
Spanning Tree Protocol attacksvtp
VLAN Trunking Protocol attacksdtp
Dynamic Trunking Protocol attackshsrp
Hot Standby Router Protocol attacksdhcp
DHCP starvation and rogue server attackscdp
Cisco Discovery Protocol attacksdot1q
802.1Q VLAN hopping attacksisl
Inter-Switch Link Protocol attacks
CAVEATS
Layer 2 attacks can severely disrupt network operations. Some attacks are denial-of-service and will cause network instability. Only use on networks you own or have explicit authorization to test. Requires root privileges. Many attacks only work on local network segments. Modern switches may have protections against some attacks.
HISTORY
Yersinia was developed by David Barroso and Alfredo Andres as a research tool to demonstrate Layer 2 vulnerabilities. The name refers to *Yersinia pestis*, the bacterium causing plague, reflecting how these attacks can spread through a network. The tool highlighted that network security must address all OSI layers, not just application-layer threats. It became a standard tool for network penetration testing.
SEE ALSO
ettercap(8), arpspoof(8), macchanger(1), tcpdump(8)


