From 18d476bada3a85e99acbf936b60757b99733803a Mon Sep 17 00:00:00 2001 From: Kevin Robertson Date: Sat, 18 Apr 2015 11:26:47 -0400 Subject: Update README.md --- README.md | 20 +++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 19eef69..0044a1d 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,21 @@ # Inveigh -Inveigh is a PowerShell LLMNR/NBNS spoofer with HTTP/SMB challenge/response capture +Inveigh is designed to assist penetration testers that find themselves restricted to a Windows system. This can commonly occur while performing phishing attacks, USB attacks, VLAN pivoting, or even restrictions from the client. +# Notes +1. Currently supports IPv4 LLMNR/NBNS spoofing and HTTP/SMB NTLMv1/NTLMv2 challenge/response capture. +2. LLMNR/NBNS spoofing are performed through sniffing and sending with raw sockets. +3. SMB captures are performed through sniffing. +4. HTTP captures are performed with a listener. +5. The local LLMNR/NBNS services do not need to be disabled on the client system. +6. LLMNR/NBNS spoofer will point victims to host system's SMB service, keep account lockout scenarios in mind. +7. Ensure that the LMMNR,NBNS,SMB,HTTP ports are open within any local firewall. +8. Output files will be created in current working directory. +9. If you copy/paste challenge/response captures from output window for password cracking, remove carriage returns. +10. Code is proof of concept level and may not work under some scenarios. + +# Usage +With default settings +Inveigh.ps1 -i localip + +With features enabled/disabled +Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -HTTP Y/N -SMB Y/N -- cgit v1.2.3