From 84d21f5ad7d271477b35a68172e19058b17bb80e Mon Sep 17 00:00:00 2001 From: Kevin Robertson Date: Sat, 1 Aug 2015 00:28:37 -0400 Subject: Added new parameter --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index a819224..a066ada 100644 --- a/README.md +++ b/README.md @@ -17,10 +17,10 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer designed to assist penetratio Obtain an elevated administrator or SYSTEM shell. If necessary, use a method to bypass script execution policy. To execute with default settings: -Inveigh.ps1 -i localip +Inveigh.ps1 To execute with features enabled/disabled: -Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -HTTP Y/N -HTTPS Y/N -SMB Y/N -Repeat Y/N -ForceWPADAuth Y/N +Inveigh.ps1 -i localip -LLMNR Y/N -NBNS Y/N -NBNSTypes 00,03,20,1B -HTTP Y/N -HTTPS Y/N -SMB Y/N -Repeat Y/N -ForceWPADAuth Y/N -Output 0,1,2 # Screenshot ![Inveigh](https://cloud.githubusercontent.com/assets/5897462/7216149/c49679ce-e5c2-11e4-9825-2abacc56e91f.PNG) -- cgit v1.2.3