Packages and Binaries:

irpas

This package contains a collection of programs used for advanced network operations, testing, and debugging.

CDP and the route injectors can be useful in a production network. Several other tools are useful for security and firewall testing. Finally some tools such as netenum are useful for general admin scripting.

Like all powerful tools, it could cause great damage, so be careful.

 * cdp - Cisco discovery protocol packet sender
 * igrp - IGRP route injector
 * ass - Autonomous system scanner
 * irdp - IRDP sender
 * irdpresponder - IRDP responder
 * itrace - ICMP based traceroute
 * tctrace - TCP SYN based traceroute
 * protos - ICMP based port scanner
 * netmask - Asks for netmask via ICMP
 * file2cable - Dumps any binary file direct to ethernet
 * dfkaa - Troubleshoot devices formerly known as Ascend (Pipeline, etc)
 * netenum - Ping scanner designed for shell scripts
 * hsrp - HSRP failover tester
 * icmp_redirect - ICMP redirection system
 * timestamp - ICMP timestamp requester
 * dhcpx - DHCP server "exerciser"

Installed size: 406 KB
How to install: sudo apt install irpas

Dependencies:
  • libc6
  • libpcap0.8
ass

Autonomous system scanner

root@kali:~# ass -h
ass [-v[v[v]]] -i <interface> [-ApcMs] [-P IER12]
	[-a <autonomous system start> -b <autonomous system stop>]
	[-S <spoofed source IP>] [-D <destination ip>]
	[-T <packets per delay>]
	[-r <filename>]

cdp

Cdp packet generator

root@kali:~# cdp -h
cdp [-v] -i <interface> -m {0,1} ...

Flood mode (-m 0):
-n <number>	number of packets
-l <number>	length of the device id
-c <char>	character to fill in device id
-r		randomize device id string

Spoof mode (-m 1):
-D <string>	Device id
-P <string>	Port id
-L <string>	Platform
-S <string>	Software
-F <string>	IP address
-C <capabilities>
	these are:
	R - Router, T - Trans Bridge, B - Source Route Bridge
	S - Switch, H - Host, I - IGMP, r - Repeater

dfkaa
root@kali:~# dfkaa -h
dfkaa: invalid option -- 'h'
Usage ... well. Look into the .c

dhcpx
root@kali:~# dhcpx -h
dhcpx [-v[v[v]]] -i <interface> [-A] 
	[-D <destination ip>]
	[-t <discovery time in secs>]
	[-u <ARP time in secs>]

file2cable

Sends a file as a raw ethernet frame

root@kali:~# file2cable -h
file2cable [-v] -i <interface> -f <file>

hsrp
root@kali:~# hsrp -h
hsrp -i <interface> -v <virtual IP> -d <router ip> -a <authword>
	-g <group> [-S <source>]
EXAMPLE:
while (true);
  do (./hsrp -d 224.0.0.2 -v192.168.1.22 -a cisco -g 1 -i eth0 ; sleep 3);
done

icmp_redirect
root@kali:~# icmp_redirect -h
icmp_redirect [-v[v[v]]] -i <interface> 
	[-s <source net>/<source mask>]
	[-d <destination net>/<destination mask>]
	[-G <gateway IP>] [-w <delay>]
	[-S <ip address>]

igrp

Igrp route injector

root@kali:~# igrp -h
Usage: 
igrp [-v[v[v]]] -i <interface> -f <routes file> 
	-a <autonomous system> [-b brute force end]
	[-S <spoofed source IP>] [-D <destination ip>]

inetmask

Ask for the netmask via ICMP

root@kali:~# inetmask -h
inetmask: invalid option -- 'h'
Usage: inetmask -d <destination> -t <timeout>

irdp

Irdp packet sender

root@kali:~# irdp -h
Usage: 
irdp [-v (useless)] -i <interface> 
	[-S <spoofed source IP>] [-D <destination ip>]
	[-l <lifetime in sec, default: 1800>] [-p <preference>]

irdpresponder

Irdpresponder packet sender

root@kali:~# irdpresponder -h
Usage: 
irdpresponder [-v[v[v]]] -i <interface>
	[-S <spoofed source IP>] [-D <destination ip>]
	[-l <lifetime in sec, default: 1800>] [-p <preference>]

itrace

Similar to traceroute, yet uses ICMP echo

root@kali:~# itrace -h
itrace: invalid option -- 'h'
Usage: itrace [-vn] [-pX] [-mX] [-tX] -i<dev> -d<destination>

-v	verbose
-n	reverse lookup IPs
-pX	send X probes (default=3)
-mX	maximum TTL (default=30)
-tX	timeout X sec (default=3)
-i<dev>	use this device
-d<des>	trace to this destination

netenum
root@kali:~# netenum -h
error in enumerate

protos
root@kali:~# protos -h
Usage: ./protos -i eth0 -d 10.1.2.3 -v
-v             verbose
-V             show which protocols are not supported
-u             don't ping targets first
-s             make the scan slow (for very remote devices)
-L             show the long protocol name and it's reference (RFC)
-p x           number of probes (default=5)
-S x           sleeptime is x (default=1)
-a x           continue scan afterwards for x seconds (default=3)
-d dest        destination (IP or IP/MASK)
-i interface   the eth0 stuff
-W             don't scan, just print the protocol list

tctrace

Similar to traceroute, yet uses TCP SYN packets

root@kali:~# tctrace -h
tctrace: invalid option -- 'h'
Usage: tctrace [-vn] [-pX] [-mX] [-tX] [-DX] [-SX] -i<dev> -d<destination>

-v	verbose
-n	reverse lookup IPs
-pX	send X probes (default=3)
-mX	maximum TTL (default=30)
-tX	timeout X sec (default=3)
-DX	destination port (default=80)
-SX	source port (default=1064)
-i<dev>	use this device
-d<des>	trace to this destination

timestamp
root@kali:~# timestamp -h
timestamp: invalid option -- 'h'
Usage: timestamp -d <destination> -t <timeout>

Updated on: 2023-Mar-08