aboutsummaryrefslogtreecommitdiff
path: root/Scripts/Inveigh-BruteForce.ps1
diff options
context:
space:
mode:
authorKevin Robertson <robertsonk@gmail.com>2016-08-02 21:47:26 -0400
committerKevin Robertson <robertsonk@gmail.com>2016-08-02 21:47:37 -0400
commit747b0d1f2fff960e378776a3cdcc9fd857a387dc (patch)
tree097387f685648b4da5004d952109f7b5f288fbf7 /Scripts/Inveigh-BruteForce.ps1
parent3dbc469024b856ef1a76157b4bf57e348a2474f2 (diff)
downloadInveigh-747b0d1f2fff960e378776a3cdcc9fd857a387dc.tar.gz
Inveigh-747b0d1f2fff960e378776a3cdcc9fd857a387dc.zip
Windows Firewall check and readme update
Added a warning for when the Windows Firewall is enabled. Added a note about the June patches likely breaking features of Invoke-InveighBruteForce.
Diffstat (limited to 'Scripts/Inveigh-BruteForce.ps1')
-rw-r--r--Scripts/Inveigh-BruteForce.ps113
1 files changed, 13 insertions, 0 deletions
diff --git a/Scripts/Inveigh-BruteForce.ps1 b/Scripts/Inveigh-BruteForce.ps1
index 5bdc181..2fa6cfd 100644
--- a/Scripts/Inveigh-BruteForce.ps1
+++ b/Scripts/Inveigh-BruteForce.ps1
@@ -285,6 +285,13 @@ else
$inveigh.status_queue.Add("Inveigh Brute Force started at $(Get-Date -format 's')") > $null
$inveigh.log.Add($inveigh.log_file_queue[$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh Brute Force started")]) > $null
+$firewall_status = netsh advfirewall show allprofiles state | where {$_ -match 'ON'}
+
+if($firewall_status)
+{
+ $inveigh.status_queue.Add("Windows Firewall = Enabled") > $null
+}
+
if($NBNS -eq 'Y')
{
$inveigh.status_queue.Add("NBNS Brute Force Spoofer Target = $SpooferTarget") > $null
@@ -445,6 +452,12 @@ if($inveigh.status_output)
$inveigh.status_queue.RemoveRange(0,1)
}
+ "Windows Firewall = Enabled"
+ {
+ Write-Warning($inveigh.status_queue[0])
+ $inveigh.status_queue.RemoveRange(0,1)
+ }
+
default
{
Write-Output($inveigh.status_queue[0])