fix: made arp.spoof debug less verbose (ref #483)

This commit is contained in:
evilsocket 2019-03-16 12:34:01 +01:00
commit 8317aded14
No known key found for this signature in database
GPG key ID: 1564D7F30393A456

View file

@ -214,7 +214,6 @@ func (mod *ArpSpoofer) getTargets(probe bool) map[string]net.HardwareAddr {
// add targets specified by IP address
for _, ip := range mod.addresses {
if mod.Session.Skip(ip) {
mod.Debug("skipping IP %s from arp spoofing.", ip)
continue
}
// do we have this ip mac address?
@ -226,10 +225,9 @@ func (mod *ArpSpoofer) getTargets(probe bool) map[string]net.HardwareAddr {
for _, hw := range mod.macs {
if ip, err := network.ArpInverseLookup(mod.Session.Interface.Name(), hw.String(), false); err == nil {
if mod.Session.Skip(net.ParseIP(ip)) {
mod.Debug("skipping address %s from arp spoofing.", ip)
} else {
targets[ip] = hw
continue
}
targets[ip] = hw
}
}