diff options
author | Kevin Robertson <robertsonk@gmail.com> | 2016-08-02 21:47:26 -0400 |
---|---|---|
committer | Kevin Robertson <robertsonk@gmail.com> | 2016-08-02 21:47:37 -0400 |
commit | 747b0d1f2fff960e378776a3cdcc9fd857a387dc (patch) | |
tree | 097387f685648b4da5004d952109f7b5f288fbf7 /Scripts/Inveigh-BruteForce.ps1 | |
parent | 3dbc469024b856ef1a76157b4bf57e348a2474f2 (diff) | |
download | Inveigh-747b0d1f2fff960e378776a3cdcc9fd857a387dc.tar.gz Inveigh-747b0d1f2fff960e378776a3cdcc9fd857a387dc.zip |
Windows Firewall check and readme update
Added a warning for when the Windows Firewall is enabled. Added a note
about the June patches likely breaking features of
Invoke-InveighBruteForce.
Diffstat (limited to 'Scripts/Inveigh-BruteForce.ps1')
-rw-r--r-- | Scripts/Inveigh-BruteForce.ps1 | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/Scripts/Inveigh-BruteForce.ps1 b/Scripts/Inveigh-BruteForce.ps1 index 5bdc181..2fa6cfd 100644 --- a/Scripts/Inveigh-BruteForce.ps1 +++ b/Scripts/Inveigh-BruteForce.ps1 @@ -285,6 +285,13 @@ else $inveigh.status_queue.Add("Inveigh Brute Force started at $(Get-Date -format 's')") > $null $inveigh.log.Add($inveigh.log_file_queue[$inveigh.log_file_queue.Add("$(Get-Date -format 's') - Inveigh Brute Force started")]) > $null +$firewall_status = netsh advfirewall show allprofiles state | where {$_ -match 'ON'} + +if($firewall_status) +{ + $inveigh.status_queue.Add("Windows Firewall = Enabled") > $null +} + if($NBNS -eq 'Y') { $inveigh.status_queue.Add("NBNS Brute Force Spoofer Target = $SpooferTarget") > $null @@ -445,6 +452,12 @@ if($inveigh.status_output) $inveigh.status_queue.RemoveRange(0,1) } + "Windows Firewall = Enabled" + { + Write-Warning($inveigh.status_queue[0]) + $inveigh.status_queue.RemoveRange(0,1) + } + default { Write-Output($inveigh.status_queue[0]) |