Packages and Binaries:
irpas
This package contains a collection of programs used for advanced network operations, testing, and debugging.
CDP and the route injectors can be useful in a production network. Several other tools are useful for security and firewall testing. Finally some tools such as netenum are useful for general admin scripting.
Like all powerful tools, it could cause great damage, so be careful.
* cdp - Cisco discovery protocol packet sender
* igrp - IGRP route injector
* ass - Autonomous system scanner
* irdp - IRDP sender
* irdpresponder - IRDP responder
* itrace - ICMP based traceroute
* tctrace - TCP SYN based traceroute
* protos - ICMP based port scanner
* netmask - Asks for netmask via ICMP
* file2cable - Dumps any binary file direct to ethernet
* dfkaa - Troubleshoot devices formerly known as Ascend (Pipeline, etc)
* netenum - Ping scanner designed for shell scripts
* hsrp - HSRP failover tester
* icmp_redirect - ICMP redirection system
* timestamp - ICMP timestamp requester
* dhcpx - DHCP server "exerciser"
Installed size: 406 KB
How to install: sudo apt install irpas
Dependencies:
- libc6
- libpcap0.8
ass
Autonomous system scanner
[email protected]:~# ass -h
ass [-v[v[v]]] -i <interface> [-ApcMs] [-P IER12]
[-a <autonomous system start> -b <autonomous system stop>]
[-S <spoofed source IP>] [-D <destination ip>]
[-T <packets per delay>]
[-r <filename>]
cdp
Cdp packet generator
[email protected]:~# cdp -h
cdp [-v] -i <interface> -m {0,1} ...
Flood mode (-m 0):
-n <number> number of packets
-l <number> length of the device id
-c <char> character to fill in device id
-r randomize device id string
Spoof mode (-m 1):
-D <string> Device id
-P <string> Port id
-L <string> Platform
-S <string> Software
-F <string> IP address
-C <capabilities>
these are:
R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater
dfkaa
[email protected]:~# dfkaa -h
dfkaa: invalid option -- 'h'
Usage ... well. Look into the .c
dhcpx
[email protected]:~# dhcpx -h
dhcpx [-v[v[v]]] -i <interface> [-A]
[-D <destination ip>]
[-t <discovery time in secs>]
[-u <ARP time in secs>]
file2cable
Sends a file as a raw ethernet frame
[email protected]:~# file2cable -h
file2cable [-v] -i <interface> -f <file>
hsrp
[email protected]:~# hsrp -h
hsrp -i <interface> -v <virtual IP> -d <router ip> -a <authword>
-g <group> [-S <source>]
EXAMPLE:
while (true);
do (./hsrp -d 224.0.0.2 -v192.168.1.22 -a cisco -g 1 -i eth0 ; sleep 3);
done
icmp_redirect
[email protected]:~# icmp_redirect -h
icmp_redirect [-v[v[v]]] -i <interface>
[-s <source net>/<source mask>]
[-d <destination net>/<destination mask>]
[-G <gateway IP>] [-w <delay>]
[-S <ip address>]
igrp
Igrp route injector
[email protected]:~# igrp -h
Usage:
igrp [-v[v[v]]] -i <interface> -f <routes file>
-a <autonomous system> [-b brute force end]
[-S <spoofed source IP>] [-D <destination ip>]
inetmask
Ask for the netmask via ICMP
[email protected]:~# inetmask -h
inetmask: invalid option -- 'h'
Usage: inetmask -d <destination> -t <timeout>
irdp
Irdp packet sender
[email protected]:~# irdp -h
Usage:
irdp [-v (useless)] -i <interface>
[-S <spoofed source IP>] [-D <destination ip>]
[-l <lifetime in sec, default: 1800>] [-p <preference>]
irdpresponder
Irdpresponder packet sender
[email protected]:~# irdpresponder -h
Usage:
irdpresponder [-v[v[v]]] -i <interface>
[-S <spoofed source IP>] [-D <destination ip>]
[-l <lifetime in sec, default: 1800>] [-p <preference>]
itrace
Similar to traceroute, yet uses ICMP echo
[email protected]:~# itrace -h
itrace: invalid option -- 'h'
Usage: itrace [-vn] [-pX] [-mX] [-tX] -i<dev> -d<destination>
-v verbose
-n reverse lookup IPs
-pX send X probes (default=3)
-mX maximum TTL (default=30)
-tX timeout X sec (default=3)
-i<dev> use this device
-d<des> trace to this destination
netenum
[email protected]:~# netenum -h
error in enumerate
protos
[email protected]:~# protos -h
Usage: ./protos -i eth0 -d 10.1.2.3 -v
-v verbose
-V show which protocols are not supported
-u don't ping targets first
-s make the scan slow (for very remote devices)
-L show the long protocol name and it's reference (RFC)
-p x number of probes (default=5)
-S x sleeptime is x (default=1)
-a x continue scan afterwards for x seconds (default=3)
-d dest destination (IP or IP/MASK)
-i interface the eth0 stuff
-W don't scan, just print the protocol list
tctrace
Similar to traceroute, yet uses TCP SYN packets
[email protected]:~# tctrace -h
tctrace: invalid option -- 'h'
Usage: tctrace [-vn] [-pX] [-mX] [-tX] [-DX] [-SX] -i<dev> -d<destination>
-v verbose
-n reverse lookup IPs
-pX send X probes (default=3)
-mX maximum TTL (default=30)
-tX timeout X sec (default=3)
-DX destination port (default=80)
-SX source port (default=1064)
-i<dev> use this device
-d<des> trace to this destination
timestamp
[email protected]:~# timestamp -h
timestamp: invalid option -- 'h'
Usage: timestamp -d <destination> -t <timeout>
Updated on: 2023-Mar-08