mirror of
https://github.com/DanMcInerney/LANs.py.git
synced 2025-07-29 19:28:24 -07:00
README
This commit is contained in:
parent
ced1b2224f
commit
4b87e0b918
2 changed files with 21 additions and 0 deletions
21
README.md
21
README.md
|
@ -7,27 +7,48 @@ Example usage:
|
||||||
python intercept.py -u -p -d -w -ip 192.168.0.10
|
python intercept.py -u -p -d -w -ip 192.168.0.10
|
||||||
|
|
||||||
Output:
|
Output:
|
||||||
|
|
||||||
-u, URLs visited; truncates at 150 characters and filters image urls since they spam the output
|
-u, URLs visited; truncates at 150 characters and filters image urls since they spam the output
|
||||||
|
|
||||||
-p, username/passwords for FTP/IMAP/POP/IRC/HTTP, POSTs made, all searches made
|
-p, username/passwords for FTP/IMAP/POP/IRC/HTTP, POSTs made, all searches made
|
||||||
|
|
||||||
-d, see all images they view with driftnet
|
-d, see all images they view with driftnet
|
||||||
|
|
||||||
-w, writes the output to the running directory in intercept.log.txt
|
-w, writes the output to the running directory in intercept.log.txt
|
||||||
|
|
||||||
-ip, target this IP address
|
-ip, target this IP address
|
||||||
|
|
||||||
|
|
||||||
Running just intercept.py without -ip argument will arp scan the network and give you a choice of targets although my wifi-monitor.py script additionally shows data usage on the LAN allowing you to pick the most active target.
|
Running just intercept.py without -ip argument will arp scan the network and give you a choice of targets although my wifi-monitor.py script additionally shows data usage on the LAN allowing you to pick the most active target.
|
||||||
|
|
||||||
All options:
|
All options:
|
||||||
|
|
||||||
python intercept.py -h
|
python intercept.py -h
|
||||||
|
|
||||||
|
|
||||||
-s, strip SSL from sites with SSLstrip
|
-s, strip SSL from sites with SSLstrip
|
||||||
|
|
||||||
-v, show verbose URLs which do not truncate at 150 characters like -u
|
-v, show verbose URLs which do not truncate at 150 characters like -u
|
||||||
|
|
||||||
-i INTERFACE, specify interface; default is first interface in `ip route`, eg: -i wlan0
|
-i INTERFACE, specify interface; default is first interface in `ip route`, eg: -i wlan0
|
||||||
|
|
||||||
-dns DOMAIN, DNS spoofing; race condition with router, will fix eventually, eg: -dns google.com
|
-dns DOMAIN, DNS spoofing; race condition with router, will fix eventually, eg: -dns google.com
|
||||||
|
|
||||||
|
|
||||||
Cleans the following on Ctrl-C:
|
Cleans the following on Ctrl-C:
|
||||||
|
|
||||||
turn off IP forwarding
|
turn off IP forwarding
|
||||||
|
|
||||||
flush iptables firewall
|
flush iptables firewall
|
||||||
|
|
||||||
individually restore each machine's ARP table
|
individually restore each machine's ARP table
|
||||||
|
|
||||||
|
|
||||||
To do:
|
To do:
|
||||||
integrate https://github.com/DanMcInerney/wifi-monitor
|
integrate https://github.com/DanMcInerney/wifi-monitor
|
||||||
|
|
||||||
change packet input from scapy to iptables' nfqueue like https://github.com/DanMcInerney/dnsspoof
|
change packet input from scapy to iptables' nfqueue like https://github.com/DanMcInerney/dnsspoof
|
||||||
|
|
||||||
|
integrate this project with wifite?
|
||||||
|
|
||||||
|
use twisted so we can use nfqueue as pkt input
|
||||||
|
|
0
intercept.log.txt
Normal file
0
intercept.log.txt
Normal file
Loading…
Add table
Add a link
Reference in a new issue