mirror of
https://github.com/bettercap/bettercap
synced 2025-08-20 13:33:21 -07:00
fix: net.recon module is now enabled by default
This commit is contained in:
parent
b956d644a9
commit
9a0f85b8bd
16 changed files with 4 additions and 21 deletions
|
@ -10,6 +10,5 @@ events.clear
|
|||
set events.stream.filter target.
|
||||
events.stream on
|
||||
|
||||
net.recon on
|
||||
api.rest on
|
||||
net.sniff on
|
||||
|
|
|
@ -4,8 +4,6 @@
|
|||
|
||||
# inject beef hook
|
||||
set http.proxy.script caplets/beef-inject.js
|
||||
# keep reading arp table for network mapping
|
||||
net.recon on
|
||||
# redirect http traffic to a proxy
|
||||
http.proxy on
|
||||
# wait for everything to start properly
|
||||
|
|
|
@ -1,7 +1,5 @@
|
|||
# inject beef hook
|
||||
set http.proxy.script caplets/beef-inject.js
|
||||
# keep reading arp table for network mapping
|
||||
net.recon on
|
||||
# redirect http traffic to a proxy
|
||||
http.proxy on
|
||||
# wait for everything to start properly
|
||||
|
|
|
@ -4,7 +4,6 @@
|
|||
|
||||
# events.stream off
|
||||
|
||||
net.recon on
|
||||
net.probe on
|
||||
sleep 1
|
||||
net.probe off
|
||||
|
|
|
@ -3,7 +3,6 @@
|
|||
# sudo ./bettercap-ng -caplet caplets/login-man-abuse.cap -eval "set arp.spoof.targets 192.168.1.53"
|
||||
|
||||
set http.proxy.script caplets/login-man-abuse.js
|
||||
net.recon on
|
||||
http.proxy on
|
||||
sleep 1
|
||||
arp.spoof on
|
||||
|
|
|
@ -6,8 +6,6 @@ set dhcp6.spoof.domains microsoft.com, google.com
|
|||
# let's give em some contents
|
||||
set http.server.path caplets/www
|
||||
|
||||
# check who's alive on the network
|
||||
net.recon on
|
||||
# serve files
|
||||
http.server on
|
||||
# redirect DNS request by spoofing DHCPv6 packets
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
net.recon on
|
||||
net.probe on
|
||||
clear
|
||||
ticker on
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
net.probe on
|
||||
net.recon on
|
||||
sleep 5
|
||||
net.show
|
||||
quit
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
net.recon on
|
||||
sleep 1
|
||||
net.show
|
||||
quit
|
||||
|
|
|
@ -4,6 +4,5 @@ set api.rest.password bcap
|
|||
# set api.rest.port 8082
|
||||
|
||||
net.probe on
|
||||
net.recon on
|
||||
api.rest on
|
||||
|
||||
|
|
|
@ -1,6 +1,3 @@
|
|||
# keep reading arp table for network mapping
|
||||
net.recon on
|
||||
|
||||
set net.sniff.regexp .*password=.+
|
||||
set net.sniff.output passwords.cap
|
||||
|
||||
|
|
|
@ -8,8 +8,6 @@ set http.proxy.script caplets/beef-inject.js
|
|||
# let's give em some contents
|
||||
set http.server.path caplets/www
|
||||
|
||||
# check who's alive on the network
|
||||
net.recon on
|
||||
# serve files
|
||||
http.server on
|
||||
# redirect DNS request by spoofing DHCPv6 packets
|
||||
|
|
|
@ -3,7 +3,6 @@
|
|||
# sudo ./bettercap-ng -caplet caplets/web-override.cap -eval "set arp.spoof.targets 192.168.1.64"
|
||||
|
||||
set http.proxy.script caplets/web-override.js
|
||||
net.recon on
|
||||
http.proxy on
|
||||
arp.spoof on
|
||||
events.clear
|
||||
|
|
|
@ -4,7 +4,7 @@ function onRequest(req, res) {
|
|||
res.Status = 200;
|
||||
res.ContentType = "text/html";
|
||||
res.Headers = "Connection: close";
|
||||
res.Body = readFile("caplets/web-override.html");
|
||||
res.Body = readFile("caplets/www/index.html");
|
||||
|
||||
res.Updated();
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue