YARSINIA

Network Security

Yersinia is a network security/hacking tool for Unix-like operating systems, designed to exploit weaknesses in different network protocols. It is considered a valuable and widely used security tool. As of 2017, Yersinia is still under development with a latest stable version number 0.8.2 available only at GitHub source code repository.

It is a framework for performing layer 2 attacks, designed to take advantage of weaknesses in various network protocols. It is a powerful tool for pentesters and security assessors to test network safeguards. The tool is named after the bacteria Yersinia pestis, which causes the plague.


DOWNLOADS

No Official Website

SYSTEM REQUIREMENTS

RAM : Atleast 1 GB (more required for heavy tasks).

Storage : Minimum 100 MB (more required for scans).

OS : Linux, Solaris, FreeBSD, and OpenBSD.

Architecture : Compatible with x86 and x64 systems.

Available On : PC


ADDITIONAL INFORMATION

Published By

Yersinia Team.

Release Date

Around 2005.

Approximate Size

422 KB

Publisher Info

Yersinia Team is a group of security researchers and developers.

Supported Languages

English

Last Update

3 March 2025.

Programming Language

Likely C and Shell scripting.

Operating System

Not cross-platform, primarily Linux-based.

License

Open-source.

Implemented Protocols

Yersinia supports attacks against the following network protocols :

  • Spanning Tree Protocol (STP)
  • Cisco Discovery Protocol (CDP)
  • Dynamic Trunking Protocol (DTP)
  • Dynamic Host Configuration Protocol (DHCP)
  • Hot Standby Router Protocol (HSRP)
  • Inter-Switch Link Protocol (ISL)
  • VLAN Trunking Protocol (VTP)
Key Features
  1. Interactive console interface for executing attacks and manipulating network parameters
  2. Supports various attack modes, including daemon, debug, and graphical modes
  3. Can be installed on Kali Linux using the package manager

  • Protocol Discovery & Analysis : Yersinia helps identify vulnerabilities in network protocols by observing their behavior.
  • Network Stress Testing : It can simulate attacks, such as DHCP starvation, to test network resilience.
  • Security Auditing : Network administrators use it to audit configurations and validate security policies.
  • Educational & Research Purposes : Cybersecurity professionals and students use Yersinia to study network security and protocol weaknesses.

  1. STP Manipulation : This mode allows you to manipulate the Spanning Tree Protocol by sending malicious Bridge Protocol Data Units (BPDUs) to the network. You can make a specific device the root of the STP tree or cause a network loop.
  2. VLAN Hopping : This mode enables you to exploit vulnerabilities in VLAN configuration to gain access to other VLANs by sending malicious packets.
  3. DHCP Spoofing : In this mode, Yersinia acts as a rogue DHCP server, responding to DHCP requests with malicious IP addresses, gateways, or other configuration settings.
  4. ARP Poisoning : This mode allows you to send malicious Address Resolution Protocol (ARP) packets to intercept and redirect network traffic to your machine.

Yersinia is a powerful tool for testing and exploiting vulnerabilities in Layer 2 network protocols. Here are some examples of its usage :

  1. DHCP Starvation Attack : Yersinia can flood a DHCP server with DHCP Discover packets using spoofed MAC addresses. This exhausts the server's IP address pool, preventing legitimate clients from obtaining an IP address.
  2. Spanning Tree Protocol (STP) Attack : Yersinia can manipulate STP to make an attacker-controlled device the root bridge. This allows the attacker to control the flow of traffic in the network.
  3. VLAN Hopping : Yersinia can exploit vulnerabilities in VLAN configurations to gain unauthorized access to other VLANs.
  4. Cisco Discovery Protocol (CDP) Exploitation : Yersinia can analyze and manipulate CDP packets to gather information about Cisco devices in the network.
  5. 802.1x Authentication Bypass : Yersinia can test and exploit weaknesses in 802.1x authentication mechanisms, potentially gaining unauthorized access to the network.

These examples demonstrate Yersinia's capabilities in identifying and exploiting vulnerabilities in Layer 2 protocols. Always ensure you have proper authorization before using such tools in any network environment!

  • libc6
  • libncurses6
  • libnet1
  • libpcap0.8
  • libtinfo6

Terminal Installation Commands ...

$ sudo apt-get upadate

$ sudo apt install yersinia


GUI Installation Steps ...
Linux
  1. Update your package list to ensure you have the latest repositories : sudo apt update
  2. Install Yersinia using the package manager : sudo apt install yersinia
  3. Launch Yersinia in GUI mode : yersinia -G

If you encounter dependency issues, running sudo apt update again usually resolves them.

Windows WSL (Windows Subsystem for Linux)
  1. Install WSL (if not already installed) :
    • Open PowerShell as Administrator and run : wsl --install
    • Restart your system if prompted.
  2. Install a Linux Distribution (e.g., Ubuntu) :
    • Run : wsl --install -d Ubuntu
    • Launch Ubuntu from the Start menu and set up your username/password.
  3. Update and Install Required Packages :
    • Open the Ubuntu terminal and run :

    $ sudo apt update && sudo apt upgrade -y

    $ sudo apt install yersinia

  4. Install GUI Support for WSL :
    • WSL supports Linux GUI applications. Install an X server like VcXsrv on Windows.
    • Configure WSL to use the X server :

    $ export DISPLAY=$(cat /etc/resolv.conf | grep nameserver | awk '{print $2; exit;}'):0

    $ export LIBGL_ALWAYS_INDIRECT=1

  5. Launch Yersinia GUI :
    • Run : yersinia -G
    • The GUI should now open.
MacOS

Using MacPorts (Recommended)

  1. Install MacPorts if you haven’t already.
  2. Open Terminal and run : sudo port install yersinia
  3. Once installed, launch Yersinia GUI using : yersinia -G

Manual Installation from Source

  1. Clone the repository :
  2. $ git clone https://github.com/BuddhaLabs/yersinia-OSX.git

  3. Navigate to the directory : cd yersinia-OSX
  4. Run the following commands :
  5. $ ./autogen.sh

    $ ./configure

    $ make

    $ sudo make install

  6. Start the GUI : yersinia -G

Terminal Uninstallation Commands ...

$ sudo apt remove yersinia

$ sudo apt autoclean && apt autoremove


GUI Uninstallation Steps ...
Linux
  1. Remove Yersinia : sudo apt remove yersinia
  2. Completely purge Yersinia and its dependencies :
  3. $ sudo apt purge yersinia

    $ sudo apt autoremove --purge yersinia

If you face issues with the GUI not working, it might be due to missing GTK dependencies. You can manually install them and compile Yersinia from source.

Windows
  1. Remove Yersinia :
    • Run :
    • $ sudo apt remove --purge yersinia -y

      $ sudo apt autoremove -y

  2. Uninstall WSL (if needed) :
    • Open PowerShell and run : wsl --unregister Ubuntu
    • If you want to remove WSL entirely : wsl --uninstall
MacOS

Using MacPorts

  1. Open Terminal and run : sudo port uninstall yersinia

Manual Uninstallation

  1. Remove the installed files :
  2. $ sudo rm -rf /usr/local/bin/yersinia

    $ sudo rm -rf /usr/local/share/yersinia

  3. Delete the cloned repository : rm -rf ~/yersinia-OSX

Copyright © 2025 HACKERSPOT

All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.

Subscribe for more Information
HACKERSPOT

HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.

Contacts

Bapatla, Andhrapradesh, India 237101

bablunannam@gmail.com

+91 7995819235