This commit is contained in:
evilsocket 2018-01-27 21:21:58 +01:00
commit 7fcabfb402

View file

@ -164,22 +164,19 @@ https.proxy on
arp.spoof on arp.spoof on
``` ```
#### caplets/simple-password-sniffer.cap #### caplets/netmon.cap
Simple password sniffer. An example of how to use the `ticker` module, use this caplet to monitor activities on your network.
```sh ```sh
# setup a regular expression for packet payloads net.probe on
set net.sniff.regexp .*password=.+ clear
# set the sniffer output file ticker on
set net.sniff.output passwords.pcap
# start the sniffer
net.sniff on
``` ```
#### caplets/mitm6.cap #### caplets/mitm6.cap
Reroute DNS requests by using DHCPv6 replies, start a HTTP server and DNS spoofer for `microsoft.com` and `google.com`. [Reroute IPv4 DNS requests by using DHCPv6 replies](https://blog.fox-it.com/2018/01/11/mitm6-compromising-ipv4-networks-via-ipv6/), start a HTTP server and DNS spoofer for `microsoft.com` and `google.com`.
```sh ```sh
# let's spoof Microsoft and Google ^_^ # let's spoof Microsoft and Google ^_^