From 73fbf9904ce59876a8a66b2262a838bdd2065c90 Mon Sep 17 00:00:00 2001 From: David Dworken Date: Sat, 8 Nov 2014 20:22:16 +0000 Subject: [PATCH] Added nmap and nbtscan to dependency list --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index f37e807..94b4367 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ Individually poisons the ARP tables of the target box, the router and the DNS se Also can be used to continuosly jam nearby WiFi networks. This has an approximate range of a 1 block radius, but this can vary based off of the strength of your WiFi card. -Prereqs: Linux, python-scapy, python-nfqueue (nfqueue-bindings 0.4-3), aircrack-ng, python-twisted, BeEF (optional), and a wireless card capable of promiscuous mode if you choose not to use the -ip option +Prereqs: Linux, python-scapy, python-nfqueue (nfqueue-bindings 0.4-3), aircrack-ng, python-twisted, BeEF (optional), nmap, nbtscan, and a wireless card capable of promiscuous mode if you choose not to use the -ip option Tested on Kali 1.0. In the following examples 192.168.0.5 will be the attacking machine and 192.168.0.10 will be the victim.