From e78bb0ab2ef3f5c2a85092c70c673a4249a9016c Mon Sep 17 00:00:00 2001 From: Patrick Chauncey Date: Thu, 12 Oct 2017 08:55:49 -0500 Subject: [PATCH] Here; fixing that link for ya Link doesn't work, here's a fix --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index cd5aad2..d96508c 100644 --- a/README.md +++ b/README.md @@ -159,5 +159,5 @@ This script uses a python nfqueue-bindings queue wrapped in a Twisted IReadDescr Injecting code undetected is a dicey game, if a minor thing goes wrong or the server the victim is requesting data from performs things in unique or rare way then the user won't be able to open the page they're trying to view and they'll know something's up. This script is designed to forward packets if anything fails so during usage you may see lots of "[!] Injected packet for www.domain.com" but only see one or two domains on the BEeF panel that the browser is hooked on. This is OK. If they don't get hooked on the first page just wait for them to browse a few other pages. The goal is to be unnoticeable. My favorite BEeF tools are in Commands > Social Engineering. Do things like create an official looking Facebook pop up saying the user's authentication expired and to re-enter their credentials. *** -* [danmcinerney.org](danmcinerney.org) +* [danmcinerney.org](http://danmcinerney.org) * [![Analytics](https://ga-beacon.appspot.com/UA-46613304-2/LANs.py/README.md)](https://github.com/igrigorik/ga-beacon)