mirror of
https://github.com/bettercap/bettercap
synced 2025-08-19 21:13:18 -07:00
refact: remove internal parameter
This commit is contained in:
parent
0759ecbc0d
commit
5ae0860485
1 changed files with 0 additions and 8 deletions
|
@ -20,7 +20,6 @@ type ArpSpoofer struct {
|
||||||
wMacs []net.HardwareAddr
|
wMacs []net.HardwareAddr
|
||||||
uAdresses []net.IP
|
uAdresses []net.IP
|
||||||
fullDuplex bool
|
fullDuplex bool
|
||||||
internal bool
|
|
||||||
ban bool
|
ban bool
|
||||||
skipRestore bool
|
skipRestore bool
|
||||||
forward bool
|
forward bool
|
||||||
|
@ -36,7 +35,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer {
|
||||||
wMacs: make([]net.HardwareAddr, 0),
|
wMacs: make([]net.HardwareAddr, 0),
|
||||||
uAdresses: make([]net.IP, 0),
|
uAdresses: make([]net.IP, 0),
|
||||||
ban: false,
|
ban: false,
|
||||||
internal: false,
|
|
||||||
fullDuplex: false,
|
fullDuplex: false,
|
||||||
skipRestore: false,
|
skipRestore: false,
|
||||||
forward: true,
|
forward: true,
|
||||||
|
@ -51,10 +49,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer {
|
||||||
|
|
||||||
mod.AddParam((session.NewStringParameter("arp.spoof.usurpate", session.ParamGatewayAddress, "", "IP addresses to usurpate, also supports nmap style IP ranges.")))
|
mod.AddParam((session.NewStringParameter("arp.spoof.usurpate", session.ParamGatewayAddress, "", "IP addresses to usurpate, also supports nmap style IP ranges.")))
|
||||||
|
|
||||||
mod.AddParam(session.NewBoolParameter("arp.spoof.internal",
|
|
||||||
"false",
|
|
||||||
"If true, local connections among computers of the network will be spoofed, otherwise only connections going to and coming from the external network."))
|
|
||||||
|
|
||||||
mod.AddParam(session.NewBoolParameter("arp.spoof.fullduplex",
|
mod.AddParam(session.NewBoolParameter("arp.spoof.fullduplex",
|
||||||
"false",
|
"false",
|
||||||
"If true, both the targets and the gateway will be attacked, otherwise only the target (if the router has ARP spoofing protections in place this will make the attack fail)."))
|
"If true, both the targets and the gateway will be attacked, otherwise only the target (if the router has ARP spoofing protections in place this will make the attack fail)."))
|
||||||
|
@ -125,8 +119,6 @@ func (mod *ArpSpoofer) Configure() error {
|
||||||
|
|
||||||
if err, mod.fullDuplex = mod.BoolParam("arp.spoof.fullduplex"); err != nil {
|
if err, mod.fullDuplex = mod.BoolParam("arp.spoof.fullduplex"); err != nil {
|
||||||
return err
|
return err
|
||||||
} else if err, mod.internal = mod.BoolParam("arp.spoof.internal"); err != nil {
|
|
||||||
return err
|
|
||||||
} else if err, mod.forward = mod.BoolParam("arp.spoof.forwarding"); err != nil {
|
} else if err, mod.forward = mod.BoolParam("arp.spoof.forwarding"); err != nil {
|
||||||
return err
|
return err
|
||||||
} else if err, targets = mod.StringParam("arp.spoof.targets"); err != nil {
|
} else if err, targets = mod.StringParam("arp.spoof.targets"); err != nil {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue