From 7f333e506b327ef977a63ab925d3a47b0fd81b0b Mon Sep 17 00:00:00 2001 From: byt3bl33d3r Date: Sat, 13 Dec 2014 21:36:13 +0100 Subject: [PATCH] updated README --- README.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 690edb8..b53b05c 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ Quick tutorials, examples and dev updates at http://sign0f4.blogspot.it This tool is completely based on sergio-proxy https://code.google.com/p/sergio-proxy/ and is an attempt to revive and update the project. Availible plugins: -- Responder +- Responder - LLMNR, NBT-NS and MDNS poisoner - Spoof - Redirect traffic using ARP Spoofing, ICMP Redirects or DHCP Spoofing and modify DNS queries - BeEFAutorun - Autoruns BeEF modules based on clients OS or browser type - AppCachePoison - Perform app cache poison attacks @@ -26,6 +26,8 @@ Availible plugins: So far the most significant changes have been: +- Integrated Responder (https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS, and act as a WPAD rogue server. + - Integrated SSLstrip+ (https://github.com/LeonardoNve/sslstrip2) by Leonardo Nve to partially bypass HSTS as demonstrated at BlackHat Asia 2014 - Addition of the AirPwn plugin (Python port of the original project), which also supports the DNSpwn attack