Results 1 to 10 of 10

Thread: hsrp spoofer

  1. #1
    Just burned his ISO
    Join Date
    Jun 2007
    Posts
    1

    Default hsrp spoofer

    The tools list has 'hsrp spoofer' but no other info. What tool is that? Where did it come from? Is it from phenoelit? Thanks.

  2. #2
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by famre888 View Post
    The tools list has 'hsrp spoofer' but no other info. What tool is that? Where did it come from? Is it from phenoelit? Thanks.
    This would be a good time to use Google, learn everything you can about it, and report back. That way, the other members of the forum could learn something new too.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  3. #3
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    WAY OFF TOPIC BUT THIS PISSED ME OFF...

    Can you believe someone is actually selling our Backtrack cd's and that people are actually buying them?? Seems like thy included Milworm video tutorials with them..dosent that just piss you off??
    http://209.85.165.104/search?q=cache...ient=firefox-a
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  4. #4
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by Xploitz View Post
    WAY OFF TOPIC BUT THIS PISSED ME OFF...

    Can you believe someone is actually selling our Backtrack cd's and that people are actually buying them?? Seems like thy included Milworm video tutorials with them..dosent that just piss you off??
    http://209.85.165.104/search?q=cache...ient=firefox-a
    Wherever there is a buck to be made, someone will be making it. Regardless of whether its legal or illegal, ethical or unethical...
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  5. #5
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Sorry for posting that here, but when I was looking up this tool and going to post my results here,(cause I seriously don't think this guy will) I came across that in my Google cache..and it pissed me off because ALOT of HARD WORK went into making this distro, and ALOT of TIME and Money as well. Wish there was something I could do about it. But anyways...I didnt come up with nothing but this on google...


    Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway.
    The protocol establishes a framework between network routers in order to achieve default gateway failover if the primary gateway should become inaccessible, in close association with a rapid-converging routing protocol like EIGRP or OSPF. By multicasting packets, HSRP sends its hello messages to the multicast address 224.0.0.2 (all routers) using UDP port 1985, to other HSRP-enabled routers, defining priority between the routers. The primary router with the highest configured priority will act as a virtual router with its own IP and MAC address, which the hosts on the local segment will be configured to use as a gateway to the destination in question. If the primary router should fail, or the link to the destination drop, the router with the next-highest priority would take over communications through alternative routes within seconds, without major interruption to network connectivity.
    HSRP and VRRP are not routing protocols as they do not advertise IP routes or affect the routing table in any way.
    HSRP and VRRP on some routers have the ability to trigger a failover if one or more interfaces on the router go down. This can be useful for dual branch routers each with a single serial link back to the head end. If the serial link of the primary router goes down, you would want the backup router to take over the primary functionality and thus retain connectivity to the head end.
    So going on this, i deducted that this tool spoofs a routers protocol for privilege escalation. Right?
    I've never used this tool...yet.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #6
    Junior Member
    Join Date
    Jul 2008
    Posts
    49

    Default

    Quote Originally Posted by famre888 View Post
    The tools list has 'hsrp spoofer' but no other info. What tool is that? Where did it come from? Is it from phenoelit? Thanks.
    Not to bump an old topic, but I have the same question as famre888.

    Who made this program? What's the author's website? I don't think it's a phenoelit program, though I could be wrong.

    Please tell me about this tool.

    Thanks in advance,

    Panarchy

  7. #7

    Default

    Not positive but I think it is part of the irpas suite of tools from phenoelit.

    HERE is the link

  8. #8
    Junior Member
    Join Date
    Jul 2008
    Posts
    49

    Thumbs up Ah!

    Quote Originally Posted by cybrsnpr View Post
    Not positive but I think it is part of the irpas suite of tools from phenoelit.

    HERE is the link
    Ahhh!

    So it was part of phenoelit afterall

    Thanks cybrsnpr

  9. #9
    Just burned his ISO
    Join Date
    Jan 2009
    Posts
    5

    Default

    Quote Originally Posted by famre888 View Post
    The tools list has 'hsrp spoofer' but no other info. What tool is that? Where did it come from? Is it from phenoelit? Thanks.
    HSRP is a cisco proprietary protocol for gateway redundancy.

    Basically two routers on the same subnet provide a single gateway for hosts to use at Layer 3 (usually your default gateway), all traffic is serviced by the active router in the HSRP pair unless the active router fails then the standby router will service the traffic.

    HSRP works at Layer 2 by using a virtual MAC address.

    Hope that helps.

    Best

    WS

  10. #10
    Junior Member
    Join Date
    Jul 2008
    Posts
    49

    Default

    Thanks.

    Yes, your reply was helpful.

    Panarchy

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •