From aab136649925226c4c2ef2996f73e3ddd9f42789 Mon Sep 17 00:00:00 2001 From: DanMcInerney Date: Sun, 20 Oct 2013 00:21:39 -0600 Subject: [PATCH] readme minor --- README.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 11a2ed9..a535c0e 100644 --- a/README.md +++ b/README.md @@ -4,10 +4,9 @@ intercept Running just intercept.py without -ip argument will arp scan the network and give you a choice of targets although I'd recommend using my wifi-monitor.py script instead since it shows data usage allowing you to pick the most active target. Example usage: -./intercept.py -u -p -w -ip 192.168.0.10 +python intercept.py -u -p -w -ip 192.168.0.10 -Prints URLs visited (-u), username/passwords for FTP/IMAP/POP/IRC/HTTP, POSTs made, all searches they make (all that is -p), writes the output to the running directory in intercept.log.txt, and spoofs the target IP (-ip). +Prints URLs visited (-u), username/passwords for FTP/IMAP/POP/IRC/HTTP, POSTs made, all searches they make (all that is -p), writes the output to the running directory in intercept.log.txt (-w), and spoofs the target IP (-ip). All options: - -./intercept.py -h +python intercept.py -h