mirror of
https://github.com/bettercap/bettercap
synced 2025-07-07 21:42:06 -07:00
fix: net.recon module is now enabled by default
This commit is contained in:
parent
b956d644a9
commit
9a0f85b8bd
16 changed files with 4 additions and 21 deletions
|
@ -10,6 +10,5 @@ events.clear
|
||||||
set events.stream.filter target.
|
set events.stream.filter target.
|
||||||
events.stream on
|
events.stream on
|
||||||
|
|
||||||
net.recon on
|
|
||||||
api.rest on
|
api.rest on
|
||||||
net.sniff on
|
net.sniff on
|
||||||
|
|
|
@ -4,8 +4,6 @@
|
||||||
|
|
||||||
# inject beef hook
|
# inject beef hook
|
||||||
set http.proxy.script caplets/beef-inject.js
|
set http.proxy.script caplets/beef-inject.js
|
||||||
# keep reading arp table for network mapping
|
|
||||||
net.recon on
|
|
||||||
# redirect http traffic to a proxy
|
# redirect http traffic to a proxy
|
||||||
http.proxy on
|
http.proxy on
|
||||||
# wait for everything to start properly
|
# wait for everything to start properly
|
||||||
|
|
|
@ -1,7 +1,5 @@
|
||||||
# inject beef hook
|
# inject beef hook
|
||||||
set http.proxy.script caplets/beef-inject.js
|
set http.proxy.script caplets/beef-inject.js
|
||||||
# keep reading arp table for network mapping
|
|
||||||
net.recon on
|
|
||||||
# redirect http traffic to a proxy
|
# redirect http traffic to a proxy
|
||||||
http.proxy on
|
http.proxy on
|
||||||
# wait for everything to start properly
|
# wait for everything to start properly
|
||||||
|
|
|
@ -4,7 +4,6 @@
|
||||||
|
|
||||||
# events.stream off
|
# events.stream off
|
||||||
|
|
||||||
net.recon on
|
|
||||||
net.probe on
|
net.probe on
|
||||||
sleep 1
|
sleep 1
|
||||||
net.probe off
|
net.probe off
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
# sudo ./bettercap-ng -caplet caplets/login-man-abuse.cap -eval "set arp.spoof.targets 192.168.1.53"
|
# sudo ./bettercap-ng -caplet caplets/login-man-abuse.cap -eval "set arp.spoof.targets 192.168.1.53"
|
||||||
|
|
||||||
set http.proxy.script caplets/login-man-abuse.js
|
set http.proxy.script caplets/login-man-abuse.js
|
||||||
net.recon on
|
|
||||||
http.proxy on
|
http.proxy on
|
||||||
sleep 1
|
sleep 1
|
||||||
arp.spoof on
|
arp.spoof on
|
||||||
|
|
|
@ -6,8 +6,6 @@ set dhcp6.spoof.domains microsoft.com, google.com
|
||||||
# let's give em some contents
|
# let's give em some contents
|
||||||
set http.server.path caplets/www
|
set http.server.path caplets/www
|
||||||
|
|
||||||
# check who's alive on the network
|
|
||||||
net.recon on
|
|
||||||
# serve files
|
# serve files
|
||||||
http.server on
|
http.server on
|
||||||
# redirect DNS request by spoofing DHCPv6 packets
|
# redirect DNS request by spoofing DHCPv6 packets
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
net.recon on
|
|
||||||
net.probe on
|
net.probe on
|
||||||
clear
|
clear
|
||||||
ticker on
|
ticker on
|
||||||
|
|
|
@ -1,5 +1,4 @@
|
||||||
net.probe on
|
net.probe on
|
||||||
net.recon on
|
|
||||||
sleep 5
|
sleep 5
|
||||||
net.show
|
net.show
|
||||||
quit
|
quit
|
||||||
|
|
|
@ -1,4 +1,3 @@
|
||||||
net.recon on
|
|
||||||
sleep 1
|
sleep 1
|
||||||
net.show
|
net.show
|
||||||
quit
|
quit
|
||||||
|
|
|
@ -4,6 +4,5 @@ set api.rest.password bcap
|
||||||
# set api.rest.port 8082
|
# set api.rest.port 8082
|
||||||
|
|
||||||
net.probe on
|
net.probe on
|
||||||
net.recon on
|
|
||||||
api.rest on
|
api.rest on
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,3 @@
|
||||||
# keep reading arp table for network mapping
|
|
||||||
net.recon on
|
|
||||||
|
|
||||||
set net.sniff.regexp .*password=.+
|
set net.sniff.regexp .*password=.+
|
||||||
set net.sniff.output passwords.cap
|
set net.sniff.output passwords.cap
|
||||||
|
|
||||||
|
|
|
@ -8,8 +8,6 @@ set http.proxy.script caplets/beef-inject.js
|
||||||
# let's give em some contents
|
# let's give em some contents
|
||||||
set http.server.path caplets/www
|
set http.server.path caplets/www
|
||||||
|
|
||||||
# check who's alive on the network
|
|
||||||
net.recon on
|
|
||||||
# serve files
|
# serve files
|
||||||
http.server on
|
http.server on
|
||||||
# redirect DNS request by spoofing DHCPv6 packets
|
# redirect DNS request by spoofing DHCPv6 packets
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
# sudo ./bettercap-ng -caplet caplets/web-override.cap -eval "set arp.spoof.targets 192.168.1.64"
|
# sudo ./bettercap-ng -caplet caplets/web-override.cap -eval "set arp.spoof.targets 192.168.1.64"
|
||||||
|
|
||||||
set http.proxy.script caplets/web-override.js
|
set http.proxy.script caplets/web-override.js
|
||||||
net.recon on
|
|
||||||
http.proxy on
|
http.proxy on
|
||||||
arp.spoof on
|
arp.spoof on
|
||||||
events.clear
|
events.clear
|
||||||
|
|
|
@ -4,7 +4,7 @@ function onRequest(req, res) {
|
||||||
res.Status = 200;
|
res.Status = 200;
|
||||||
res.ContentType = "text/html";
|
res.ContentType = "text/html";
|
||||||
res.Headers = "Connection: close";
|
res.Headers = "Connection: close";
|
||||||
res.Body = readFile("caplets/web-override.html");
|
res.Body = readFile("caplets/www/index.html");
|
||||||
|
|
||||||
res.Updated();
|
res.Updated();
|
||||||
}
|
}
|
||||||
|
|
2
main.go
2
main.go
|
@ -41,6 +41,8 @@ func main() {
|
||||||
|
|
||||||
if err = sess.Run("events.stream on"); err != nil {
|
if err = sess.Run("events.stream on"); err != nil {
|
||||||
log.Fatal("%", err)
|
log.Fatal("%", err)
|
||||||
|
} else if err = sess.Run("net.recon on"); err != nil {
|
||||||
|
log.Fatal("%", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
defer sess.Close()
|
defer sess.Close()
|
||||||
|
|
|
@ -82,7 +82,7 @@ func (t *Ticker) Start() error {
|
||||||
|
|
||||||
t.SetRunning(true)
|
t.SetRunning(true)
|
||||||
go func() {
|
go func() {
|
||||||
log.Info("Ticker running with period %ds.", t.Period)
|
log.Info("Ticker running with period %ds.", t.Period.Seconds())
|
||||||
tick := time.Tick(t.Period)
|
tick := time.Tick(t.Period)
|
||||||
for _ = range tick {
|
for _ = range tick {
|
||||||
if t.Running() == false {
|
if t.Running() == false {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue