mirror of
https://github.com/DanMcInerney/LANs.py.git
synced 2025-07-06 04:52:18 -07:00
Added Ubuntu note
This commit is contained in:
parent
004f0a6f9c
commit
a7719e1211
1 changed files with 8 additions and 0 deletions
|
@ -164,6 +164,14 @@ This script uses a python nfqueue-bindings queue wrapped in a Twisted IReadDescr
|
|||
|
||||
Injecting code undetected is a dicey game, if a minor thing goes wrong or the server the victim is requesting data from performs things in unique or rare way then the user won't be able to open the page they're trying to view and they'll know something's up. This script is designed to forward packets if anything fails so during usage you may see lots of "[!] Injected packet for www.domain.com" but only see one or two domains on the BEeF panel that the browser is hooked on. This is OK. If they don't get hooked on the first page just wait for them to browse a few other pages. The goal is to be unnoticeable. My favorite BEeF tools are in Commands > Social Engineering. Do things like create an official looking Facebook pop up saying the user's authentication expired and to re-enter their credentials.
|
||||
|
||||
NOTE TO UBUNTU USERS: you will need to update/manually install nfqueue-bindings to version 0.4.3 due to the fact the version in Ubuntu's repo is 0.2. Alternatively just edit the Parser.start() function from:
|
||||
|
||||
def start(self, payload):
|
||||
|
||||
to:
|
||||
|
||||
def start(self, i, payload)
|
||||
|
||||
***
|
||||
* [danmcinerney.org](danmcinerney.org)
|
||||
* [](https://github.com/igrigorik/ga-beacon)
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue