From ef1db479fd6e495c2e0469121b3e3ca49209efaf Mon Sep 17 00:00:00 2001 From: Kevin Robertson Date: Tue, 15 Mar 2016 21:06:14 -0400 Subject: New Script - Inveigh-BruteForce New Script - Inveigh-BruteForce - Remote (Hot Potato method)/unprivileged NBNS brute force spoofer. Inveigh-BruteForce Features: Targeted IPv4 NBNS brute force spoofer with granular control NTLMv1/NTLMv2 challenge/response capture over HTTP Granular control of console and file output Run time control Inveigh New Parameters: HTTPSCertAppID - Specify a valid application GUID for use with the ceriticate. LLMNRTTL - Specify a custom LLMNR TTL in seconds for the response packet. NBNSTTL - Specify a custom NBNS TTL in seconds for the response packet. WPADDirectHosts - Comma separated list of hosts to list as direct in the wpad.dat file. Listed hosts will not be routed through the defined proxy. Inveigh-Relay New Parameters: HTTPSCertAppID - Specify a valid application GUID for use with the ceriticate. RunTime - Set the run time duration in minutes. Bug Fix: Fixed an SMB relay issue that was causing a hang before sending the NTLMv2 response. Thanks to @mubix for reporting the bug and providing a packet capture. --- Inveigh.psm1 | 1 + 1 file changed, 1 insertion(+) (limited to 'Inveigh.psm1') diff --git a/Inveigh.psm1 b/Inveigh.psm1 index 19c181f..3e0cf7e 100644 --- a/Inveigh.psm1 +++ b/Inveigh.psm1 @@ -6,4 +6,5 @@ Inveigh is a Windows PowerShell LLMNR/NBNS spoofer with challenge/response captu https://github.com/Kevin-Robertson/Inveigh #> Import-Module $PWD\Scripts\Inveigh.ps1 +Import-Module $PWD\Scripts\Inveigh-BruteForce.ps1 Import-Module $PWD\Scripts\Inveigh-Relay.ps1 \ No newline at end of file -- cgit v1.2.3