diff options
author | Kevin Robertson <robertsonk@gmail.com> | 2015-09-20 22:17:57 -0400 |
---|---|---|
committer | Kevin Robertson <robertsonk@gmail.com> | 2015-09-20 22:17:57 -0400 |
commit | 2575cc3ff4bd9ac997406cac2de6e87f1d75e774 (patch) | |
tree | 7f1958304438aa1aca2280937e8fd366849ea9c9 /README.md | |
parent | 9e985e59137bc25eb0fea618d076f7e2f9a87d0d (diff) | |
download | Inveigh-2575cc3ff4bd9ac997406cac2de6e87f1d75e774.tar.gz Inveigh-2575cc3ff4bd9ac997406cac2de6e87f1d75e774.zip |
Removed invalid note regarding output location
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 5 |
1 files changed, 2 insertions, 3 deletions
@@ -13,9 +13,8 @@ Tested minimums are PowerShell 2.0 and .NET 3.5. 6. LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind. 7. Kerberos should downgrade for SMB authentication due to spoofed hostnames not being valid in DNS. 8. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open within any local firewall on the host system. -9. Output files will be created in current working directory. -10. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns. -11. SMB relay support is experimental at this point, use caution if employing on a pen test. +9. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns. +10. SMB relay support is experimental at this point, use caution if employing on a pen test. # Usage Obtain an elevated administrator or SYSTEM shell. If necessary, use a method to bypass the PowerShell script execution policy. |