fix: net.recon module is now enabled by default

This commit is contained in:
evilsocket 2018-01-27 21:13:49 +01:00
parent b956d644a9
commit 9a0f85b8bd
16 changed files with 4 additions and 21 deletions

View file

@ -10,6 +10,5 @@ events.clear
set events.stream.filter target. set events.stream.filter target.
events.stream on events.stream on
net.recon on
api.rest on api.rest on
net.sniff on net.sniff on

View file

@ -4,8 +4,6 @@
# inject beef hook # inject beef hook
set http.proxy.script caplets/beef-inject.js set http.proxy.script caplets/beef-inject.js
# keep reading arp table for network mapping
net.recon on
# redirect http traffic to a proxy # redirect http traffic to a proxy
http.proxy on http.proxy on
# wait for everything to start properly # wait for everything to start properly

View file

@ -1,7 +1,5 @@
# inject beef hook # inject beef hook
set http.proxy.script caplets/beef-inject.js set http.proxy.script caplets/beef-inject.js
# keep reading arp table for network mapping
net.recon on
# redirect http traffic to a proxy # redirect http traffic to a proxy
http.proxy on http.proxy on
# wait for everything to start properly # wait for everything to start properly

View file

@ -4,7 +4,6 @@
# events.stream off # events.stream off
net.recon on
net.probe on net.probe on
sleep 1 sleep 1
net.probe off net.probe off

View file

@ -3,7 +3,6 @@
# sudo ./bettercap-ng -caplet caplets/login-man-abuse.cap -eval "set arp.spoof.targets 192.168.1.53" # sudo ./bettercap-ng -caplet caplets/login-man-abuse.cap -eval "set arp.spoof.targets 192.168.1.53"
set http.proxy.script caplets/login-man-abuse.js set http.proxy.script caplets/login-man-abuse.js
net.recon on
http.proxy on http.proxy on
sleep 1 sleep 1
arp.spoof on arp.spoof on

View file

@ -6,8 +6,6 @@ set dhcp6.spoof.domains microsoft.com, google.com
# let's give em some contents # let's give em some contents
set http.server.path caplets/www set http.server.path caplets/www
# check who's alive on the network
net.recon on
# serve files # serve files
http.server on http.server on
# redirect DNS request by spoofing DHCPv6 packets # redirect DNS request by spoofing DHCPv6 packets

View file

@ -1,4 +1,3 @@
net.recon on
net.probe on net.probe on
clear clear
ticker on ticker on

View file

@ -1,5 +1,4 @@
net.probe on net.probe on
net.recon on
sleep 5 sleep 5
net.show net.show
quit quit

View file

@ -1,4 +1,3 @@
net.recon on
sleep 1 sleep 1
net.show net.show
quit quit

View file

@ -4,6 +4,5 @@ set api.rest.password bcap
# set api.rest.port 8082 # set api.rest.port 8082
net.probe on net.probe on
net.recon on
api.rest on api.rest on

View file

@ -1,6 +1,3 @@
# keep reading arp table for network mapping
net.recon on
set net.sniff.regexp .*password=.+ set net.sniff.regexp .*password=.+
set net.sniff.output passwords.cap set net.sniff.output passwords.cap

View file

@ -8,8 +8,6 @@ set http.proxy.script caplets/beef-inject.js
# let's give em some contents # let's give em some contents
set http.server.path caplets/www set http.server.path caplets/www
# check who's alive on the network
net.recon on
# serve files # serve files
http.server on http.server on
# redirect DNS request by spoofing DHCPv6 packets # redirect DNS request by spoofing DHCPv6 packets

View file

@ -3,7 +3,6 @@
# sudo ./bettercap-ng -caplet caplets/web-override.cap -eval "set arp.spoof.targets 192.168.1.64" # sudo ./bettercap-ng -caplet caplets/web-override.cap -eval "set arp.spoof.targets 192.168.1.64"
set http.proxy.script caplets/web-override.js set http.proxy.script caplets/web-override.js
net.recon on
http.proxy on http.proxy on
arp.spoof on arp.spoof on
events.clear events.clear

View file

@ -4,7 +4,7 @@ function onRequest(req, res) {
res.Status = 200; res.Status = 200;
res.ContentType = "text/html"; res.ContentType = "text/html";
res.Headers = "Connection: close"; res.Headers = "Connection: close";
res.Body = readFile("caplets/web-override.html"); res.Body = readFile("caplets/www/index.html");
res.Updated(); res.Updated();
} }

View file

@ -41,6 +41,8 @@ func main() {
if err = sess.Run("events.stream on"); err != nil { if err = sess.Run("events.stream on"); err != nil {
log.Fatal("%", err) log.Fatal("%", err)
} else if err = sess.Run("net.recon on"); err != nil {
log.Fatal("%", err)
} }
defer sess.Close() defer sess.Close()

View file

@ -82,7 +82,7 @@ func (t *Ticker) Start() error {
t.SetRunning(true) t.SetRunning(true)
go func() { go func() {
log.Info("Ticker running with period %ds.", t.Period) log.Info("Ticker running with period %ds.", t.Period.Seconds())
tick := time.Tick(t.Period) tick := time.Tick(t.Period)
for _ = range tick { for _ = range tick {
if t.Running() == false { if t.Running() == false {