aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorKevin Robertson <robertsonk@gmail.com>2015-09-20 22:17:57 -0400
committerKevin Robertson <robertsonk@gmail.com>2015-09-20 22:17:57 -0400
commit2575cc3ff4bd9ac997406cac2de6e87f1d75e774 (patch)
tree7f1958304438aa1aca2280937e8fd366849ea9c9 /README.md
parent9e985e59137bc25eb0fea618d076f7e2f9a87d0d (diff)
downloadInveigh-2575cc3ff4bd9ac997406cac2de6e87f1d75e774.tar.gz
Inveigh-2575cc3ff4bd9ac997406cac2de6e87f1d75e774.zip
Removed invalid note regarding output location
Diffstat (limited to 'README.md')
-rw-r--r--README.md5
1 files changed, 2 insertions, 3 deletions
diff --git a/README.md b/README.md
index 027c0c7..0798898 100644
--- a/README.md
+++ b/README.md
@@ -13,9 +13,8 @@ Tested minimums are PowerShell 2.0 and .NET 3.5.
6. LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind.
7. Kerberos should downgrade for SMB authentication due to spoofed hostnames not being valid in DNS.
8. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open within any local firewall on the host system.
-9. Output files will be created in current working directory.
-10. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns.
-11. SMB relay support is experimental at this point, use caution if employing on a pen test.
+9. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns.
+10. SMB relay support is experimental at this point, use caution if employing on a pen test.
# Usage
Obtain an elevated administrator or SYSTEM shell. If necessary, use a method to bypass the PowerShell script execution policy.