aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKevin Robertson <robertsonk@gmail.com>2016-09-11 17:24:38 -0400
committerKevin Robertson <robertsonk@gmail.com>2016-09-11 17:24:38 -0400
commite5c449cc813df847fbb71599ee90db62d66ddf61 (patch)
treef06699c907ecc1058c7a63a2c83e7f28a2b01ac5
parent377fe231183ab549aac43c42e3e8a44cfca6047f (diff)
downloadInveigh-e5c449cc813df847fbb71599ee90db62d66ddf61.tar.gz
Inveigh-e5c449cc813df847fbb71599ee90db62d66ddf61.zip
Readme fix
-rw-r--r--README.md13
1 files changed, 3 insertions, 10 deletions
diff --git a/README.md b/README.md
index eebdf87..edeace4 100644
--- a/README.md
+++ b/README.md
@@ -35,13 +35,6 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer/man-in-the-middle tool design
##### Privilege Requirements:
* Elevated Administrator or SYSTEM
-## Miscellaneous Notes
-* The local LLMNR/NBNS services do not need to be disabled on the host system.
-* LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind.
-* Kerberos should downgrade for SMB authentication due to spoofed hostnames not being valid in DNS.
-* Ensure that any needed LMMNR,NBNS,SMB,HTTP,HTTPS ports are open within any local firewall on the host system.
-* If you copy/paste challenge/response captures from the console window for password cracking, ensure that there are no extra carriage returns.
-
##### Features:
* IPv4 LLMNR/NBNS spoofer with granular control
* NTLMv1/NTLMv2 challenge/response capture over HTTP/HTTPS/SMB
@@ -56,7 +49,7 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer/man-in-the-middle tool design
* SMB challenge/response captures are performed by sniffing over the host system's SMB service.
* The local LLMNR/NBNS services do not need to be disabled on the host system.
* LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind.
-* Ensure that any needed LMMNR,NBNS,SMB,HTTP,HTTPS ports are open within any local firewall on the host system.
+* Ensure that any needed LMMNR, NBNS, SMB, HTTP, HTTPS ports are open within any local firewall on the host system.
* If you copy/paste challenge/response captures from the console window for password cracking, ensure that there are no extra carriage returns.
##### Examples:
@@ -139,7 +132,7 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer/man-in-the-middle tool design
##### Notes:
* The local NBNS service does not need to be disabled on the host system.
-* Ensure that any needed LMMNR,NBNS,HTTP ports are open within any local firewall on the host system.
+* Ensure that any needed LMMNR, NBNS, HTTP ports are open within any local firewall on the host system.
* If you copy/paste challenge/response captures from the console window for password cracking, ensure that there are no extra carriage returns.
* Microsoft released patches in June 2016 that will likely prevent some of this function's brute force features from working the way they did before June.
@@ -241,7 +234,7 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer/man-in-the-middle tool design
* __Tool__ - Default = 0: (0,1,2) Enable/Disable features for better operation through external tools such as Metasploit's Interactive Powershell Sessions and Empire. 0 = None, 1 = Metasploit, 2 = Empire
##### Notes:
-* Ensure that any needed HTTP,HTTPS ports are open within any local firewall on the host system.
+* Ensure that any needed HTTP, HTTPS ports are open within any local firewall on the host system.
* If you copy/paste challenge/response captures from the console window for password cracking, ensure that there are no extra carriage returns.
### Support Functions