From 5ae08604854fe196bd62cf8dc7d5f6c74eae2d8c Mon Sep 17 00:00:00 2001 From: pviossat <23701489+pviossat@users.noreply.github.com> Date: Fri, 10 Sep 2021 15:32:29 +0200 Subject: [PATCH] refact: remove internal parameter --- modules/arp_spoof/arp_spoof.go | 8 -------- 1 file changed, 8 deletions(-) diff --git a/modules/arp_spoof/arp_spoof.go b/modules/arp_spoof/arp_spoof.go index 76175449..368d94eb 100644 --- a/modules/arp_spoof/arp_spoof.go +++ b/modules/arp_spoof/arp_spoof.go @@ -20,7 +20,6 @@ type ArpSpoofer struct { wMacs []net.HardwareAddr uAdresses []net.IP fullDuplex bool - internal bool ban bool skipRestore bool forward bool @@ -36,7 +35,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer { wMacs: make([]net.HardwareAddr, 0), uAdresses: make([]net.IP, 0), ban: false, - internal: false, fullDuplex: false, skipRestore: false, forward: true, @@ -51,10 +49,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer { mod.AddParam((session.NewStringParameter("arp.spoof.usurpate", session.ParamGatewayAddress, "", "IP addresses to usurpate, also supports nmap style IP ranges."))) - mod.AddParam(session.NewBoolParameter("arp.spoof.internal", - "false", - "If true, local connections among computers of the network will be spoofed, otherwise only connections going to and coming from the external network.")) - mod.AddParam(session.NewBoolParameter("arp.spoof.fullduplex", "false", "If true, both the targets and the gateway will be attacked, otherwise only the target (if the router has ARP spoofing protections in place this will make the attack fail).")) @@ -125,8 +119,6 @@ func (mod *ArpSpoofer) Configure() error { if err, mod.fullDuplex = mod.BoolParam("arp.spoof.fullduplex"); err != nil { return err - } else if err, mod.internal = mod.BoolParam("arp.spoof.internal"); err != nil { - return err } else if err, mod.forward = mod.BoolParam("arp.spoof.forwarding"); err != nil { return err } else if err, targets = mod.StringParam("arp.spoof.targets"); err != nil {