mirror of
https://github.com/bettercap/bettercap
synced 2025-08-19 13:09:49 -07:00
refact: remove internal parameter
This commit is contained in:
parent
0759ecbc0d
commit
5ae0860485
1 changed files with 0 additions and 8 deletions
|
@ -20,7 +20,6 @@ type ArpSpoofer struct {
|
|||
wMacs []net.HardwareAddr
|
||||
uAdresses []net.IP
|
||||
fullDuplex bool
|
||||
internal bool
|
||||
ban bool
|
||||
skipRestore bool
|
||||
forward bool
|
||||
|
@ -36,7 +35,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer {
|
|||
wMacs: make([]net.HardwareAddr, 0),
|
||||
uAdresses: make([]net.IP, 0),
|
||||
ban: false,
|
||||
internal: false,
|
||||
fullDuplex: false,
|
||||
skipRestore: false,
|
||||
forward: true,
|
||||
|
@ -51,10 +49,6 @@ func NewArpSpoofer(s *session.Session) *ArpSpoofer {
|
|||
|
||||
mod.AddParam((session.NewStringParameter("arp.spoof.usurpate", session.ParamGatewayAddress, "", "IP addresses to usurpate, also supports nmap style IP ranges.")))
|
||||
|
||||
mod.AddParam(session.NewBoolParameter("arp.spoof.internal",
|
||||
"false",
|
||||
"If true, local connections among computers of the network will be spoofed, otherwise only connections going to and coming from the external network."))
|
||||
|
||||
mod.AddParam(session.NewBoolParameter("arp.spoof.fullduplex",
|
||||
"false",
|
||||
"If true, both the targets and the gateway will be attacked, otherwise only the target (if the router has ARP spoofing protections in place this will make the attack fail)."))
|
||||
|
@ -125,8 +119,6 @@ func (mod *ArpSpoofer) Configure() error {
|
|||
|
||||
if err, mod.fullDuplex = mod.BoolParam("arp.spoof.fullduplex"); err != nil {
|
||||
return err
|
||||
} else if err, mod.internal = mod.BoolParam("arp.spoof.internal"); err != nil {
|
||||
return err
|
||||
} else if err, mod.forward = mod.BoolParam("arp.spoof.forwarding"); err != nil {
|
||||
return err
|
||||
} else if err, targets = mod.StringParam("arp.spoof.targets"); err != nil {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue