aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorKevin Robertson <robertsonk@gmail.com>2015-08-01 00:28:37 -0400
committerKevin Robertson <robertsonk@gmail.com>2015-08-01 00:28:37 -0400
commit84d21f5ad7d271477b35a68172e19058b17bb80e (patch)
tree0b7c5b1703447f17102f206a7d673a009a741c7b /README.md
parent2ad8dc9426a5b0cceb4ef8fcd79fec89454b9f8e (diff)
downloadInveigh-84d21f5ad7d271477b35a68172e19058b17bb80e.tar.gz
Inveigh-84d21f5ad7d271477b35a68172e19058b17bb80e.zip
Added new parameter
Diffstat (limited to 'README.md')
-rw-r--r--README.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/README.md b/README.md
index a819224..a066ada 100644
--- a/README.md
+++ b/README.md
@@ -17,10 +17,10 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer designed to assist penetratio
Obtain an elevated administrator or SYSTEM shell. If necessary, use a method to bypass script execution policy.
To execute with default settings:
-Inveigh.ps1 -i localip
+Inveigh.ps1
To execute with features enabled/disabled:
-Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -HTTP Y/N -HTTPS Y/N -SMB Y/N -Repeat Y/N -ForceWPADAuth Y/N
+Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -NBNSTypes 00,03,20,1B -HTTP Y/N -HTTPS Y/N -SMB Y/N -Repeat Y/N -ForceWPADAuth Y/N -Output 0,1,2
# Screenshot
![Inveigh](https://cloud.githubusercontent.com/assets/5897462/7216149/c49679ce-e5c2-11e4-9825-2abacc56e91f.PNG)