aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorKevin Robertson <robertsonk@gmail.com>2015-08-05 00:37:19 -0400
committerKevin Robertson <robertsonk@gmail.com>2015-08-05 00:37:19 -0400
commit303a4180214cd99329b5dddcf440f480b6052608 (patch)
treec745c725070d78469ca983f8225eae48b27b248d /README.md
parent11611f4c8e542059b5a93b3a0dfba70503ee70d6 (diff)
downloadInveigh-303a4180214cd99329b5dddcf440f480b6052608.tar.gz
Inveigh-303a4180214cd99329b5dddcf440f480b6052608.zip
Added requirements section
Diffstat (limited to 'README.md')
-rw-r--r--README.md3
1 files changed, 3 insertions, 0 deletions
diff --git a/README.md b/README.md
index a066ada..c015622 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,9 @@
# Inveigh
Inveigh is a Windows PowerShell LLMNR/NBNS spoofer designed to assist penetration testers that find themselves limited to a Windows system. This can commonly occur while performing phishing attacks, USB drive attacks, VLAN pivoting, or simply being restricted to a Windows system as part of client imposed restrictions.
+# Requirements
+Tested with PowerShell 2.0 and .NET 3.5.
+
# Notes
1. Currently supports IPv4 LLMNR/NBNS spoofing and HTTP/SMB NTLMv1/NTLMv2 challenge/response capture.
2. LLMNR/NBNS spoofing is performed through sniffing and sending with raw sockets.