diff --git a/modules/arp_spoof/arp_spoof.go b/modules/arp_spoof/arp_spoof.go index 76175449..368d94eb 100644 --- a/modules/arp_spoof/arp_spoof.go +++ b/modules/arp_spoof/arp_spoof.go @@ -20,7 +20,6 @@ type ArpSpoofer struct { wMacs []net.HardwareAddr uAdresses []net.IP fullDuplex bool - internal bool ban bool skipRestore bool forward bool @@ -36,7 +35,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer { wMacs: make([]net.HardwareAddr, 0), uAdresses: make([]net.IP, 0), ban: false, - internal: false, fullDuplex: false, skipRestore: false, forward: true, @@ -51,10 +49,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer { mod.AddParam((session.NewStringParameter("arp.spoof.usurpate", session.ParamGatewayAddress, "", "IP addresses to usurpate, also supports nmap style IP ranges."))) - mod.AddParam(session.NewBoolParameter("arp.spoof.internal", - "false", - "If true, local connections among computers of the network will be spoofed, otherwise only connections going to and coming from the external network.")) - mod.AddParam(session.NewBoolParameter("arp.spoof.fullduplex", "false", "If true, both the targets and the gateway will be attacked, otherwise only the target (if the router has ARP spoofing protections in place this will make the attack fail).")) @@ -125,8 +119,6 @@ func (mod *ArpSpoofer) Configure() error { if err, mod.fullDuplex = mod.BoolParam("arp.spoof.fullduplex"); err != nil { return err - } else if err, mod.internal = mod.BoolParam("arp.spoof.internal"); err != nil { - return err } else if err, mod.forward = mod.BoolParam("arp.spoof.forwarding"); err != nil { return err } else if err, targets = mod.StringParam("arp.spoof.targets"); err != nil {