diff options
author | Kevin Robertson <robertsonk@gmail.com> | 2017-04-09 23:07:52 -0400 |
---|---|---|
committer | Kevin Robertson <robertsonk@gmail.com> | 2017-04-09 23:07:52 -0400 |
commit | a2553ac147ceddb23bb85f3e37f9b82c626b6e38 (patch) | |
tree | 9ae6f8668eb6483a5ff437a2820209038f7e7cde | |
parent | f162c96d35758e1eed69c86e4145c7170bae4cb9 (diff) | |
download | Inveigh-a2553ac147ceddb23bb85f3e37f9b82c626b6e38.tar.gz Inveigh-a2553ac147ceddb23bb85f3e37f9b82c626b6e38.zip |
Readme update
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -20,7 +20,7 @@ Inveigh is a PowerShell LLMNR/mDNS/NBNS spoofer and man-in-the-middle tool desig ## Overview -At its core, Inveigh is a .NET packet sniffer that listens for and responds to LLMNR/mDNS/NBNS requests while also capturing incoming NTLMv1/NTLMv2 authentication attempts over the Windows SMB service. The primary advantage of this packet sniffing method on Windows is that port conflicts with default running services are avoided. Inveigh’s HTTP/HTTPS/Proxy based features are not provided through the packet sniffer, they are provided through TCP listeners. Inveigh relies on creating multiple runspaces to load the sniffer, listeners, and control functions within a single shell and PowerShell process. +At its core, Inveigh is a .NET packet sniffer that listens for and responds to LLMNR/mDNS/NBNS requests while also capturing incoming NTLMv1/NTLMv2 authentication attempts over the Windows SMB service. The primary advantage of this packet sniffing method on Windows is that port conflicts with default running services are avoided. Inveigh also contains HTTP/HTTPS/Proxy listeners for capturing incoming authentication requests and performing attacks. Inveigh relies on creating multiple runspaces to load the sniffer, listeners, and control functions within a single shell and PowerShell process. ##### Inveigh running with elevated privilege  |