aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
Diffstat (limited to 'README.md')
-rw-r--r--README.md20
1 files changed, 19 insertions, 1 deletions
diff --git a/README.md b/README.md
index 19eef69..0044a1d 100644
--- a/README.md
+++ b/README.md
@@ -1,3 +1,21 @@
# Inveigh
-Inveigh is a PowerShell LLMNR/NBNS spoofer with HTTP/SMB challenge/response capture
+Inveigh is designed to assist penetration testers that find themselves restricted to a Windows system. This can commonly occur while performing phishing attacks, USB attacks, VLAN pivoting, or even restrictions from the client.
+# Notes
+1. Currently supports IPv4 LLMNR/NBNS spoofing and HTTP/SMB NTLMv1/NTLMv2 challenge/response capture.
+2. LLMNR/NBNS spoofing are performed through sniffing and sending with raw sockets.
+3. SMB captures are performed through sniffing.
+4. HTTP captures are performed with a listener.
+5. The local LLMNR/NBNS services do not need to be disabled on the client system.
+6. LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind.
+7. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open within any local firewall.
+8. Output files will be created in current working directory.
+9. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns.
+10. Code is proof of concept level and may not work under some scenarios.
+
+# Usage
+With default settings
+Inveigh.ps1 -i localip
+
+With features enabled/disabled
+Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -HTTP Y/N -SMB Y/N